US20110225090A1 - System and method including customized linkage rules in payment transactions - Google Patents
System and method including customized linkage rules in payment transactions Download PDFInfo
- Publication number
- US20110225090A1 US20110225090A1 US13/038,268 US201113038268A US2011225090A1 US 20110225090 A1 US20110225090 A1 US 20110225090A1 US 201113038268 A US201113038268 A US 201113038268A US 2011225090 A1 US2011225090 A1 US 2011225090A1
- Authority
- US
- United States
- Prior art keywords
- user
- identifier
- portable consumer
- verification token
- request message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/405—Establishing or using transaction specific rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
Definitions
- a user may use a credit card to purchase an item at a merchant or enter his account information into a payment page of a merchant's website.
- the merchant then generates an authorization request message using a POS (point of sale) terminal when the user is present at the merchant location.
- the merchant website may generate an authorization request message for card-not-present (CNP) transactions.
- CNP card-not-present
- Embodiments of the invention address these and other problems, individually and collectively.
- Embodiments of the invention disclosed herein include systems and methods for generating dynamic verification values for use in the electronic payment transactions.
- One embodiment of the invention is directed to receiving an authentication request message including a verification token identifier associated with a verification token, a user communication device identifier associated with a communication device, and an account identifier associated with a portable consumer device; and analyzing the verification token identifier, the user communication device identifier, and the account identifier in the authentication request message to determine if a user using the verification token, the user communication device and the portable consumer device is an authentic user.
- Another embodiment of the invention is directed to determining whether the account identifier associated with the portable consumer device is associated with one or more customized linkage rules, and determining whether the authentication request message complies with the one or more customized linkage rules.
- Another embodiment of the invention is directed to prompting a user to provide a user identifier if the customized linkage rules indicate that the user identifier is required from the user.
- the user identifiers include any one of a voice signature of the user, fingerprint of the user or a password.
- Another embodiment of the invention is directed to generating a dynamic verification value if the authentication request message complies with the one or more customized linkage rules, and sending the dynamic verification value to the verification token, and to a server computer in communication with a payment processing network.
- Another embodiment of the invention is directed to an enrollment process where an account identifier is received from a user, and the user is provided with one or more customized linkage options. The user then identifies one or more customized linkage rules from the customized linkage options. The user communication devices and/or verification tokens identified in the customized linkage rules are registered and the account identifier is associated with the customized linkage rules.
- FIG. 1 shows a system according to an embodiment of the invention.
- FIG. 2 shows a user communication device according to an embodiment of the invention.
- FIG. 3 illustrates a flowchart that shows the steps involved in enrollment process according to an embodiment of the invention.
- FIG. 4 shows two tables that show some possible customized linkage rules.
- FIG. 5 shows some examples of customized linkage rules according to an embodiment of the invention.
- FIG. 6 illustrates a flowchart that illustrates the steps involved in checking the customized linkage rules and generating a dynamic verification value according to an embodiment of the invention.
- FIG. 7 shows a system according to an embodiment of the invention.
- a portable consumer device e.g. credit and debit card
- a verification token and one or more user communication devices e.g. a user computer
- a payment transaction that originates from the specified combination of the verification token, portable consumer device and one or more user communication devices is determined to be authentic and originated from an authorized source.
- a payment transaction that that originates without the presence of the identified combination of the portable consumer device, verification token and one or more user communication devices may be determined not to be authentic.
- Embodiments of the invention disclosed herein include systems and methods for linking portable consumer devices (e.g. a credit/debit card), user communication devices (e.g. a laptop computer), verification tokens, and user specific identifiers (e.g. fingerprint, password, user voice signature, etc.) and establishing one or more customized linkage rules associated with an account identifier associated with the portable consumer device.
- portable consumer devices e.g. a credit/debit card
- user communication devices e.g. a laptop computer
- verification tokens e.g. fingerprint, password, user voice signature, etc.
- user specific identifiers e.g. fingerprint, password, user voice signature, etc.
- account identifier refers to a means of identifying a financial account associated with a consumer (i.e. user) using which the consumer engages in financial activity.
- an account identifier may be a Primary Account Number (PAN) of a credit and/or debit card.
- PAN Primary Account Number
- the Primary Account Number (PAN) may include numbers and/or letters and may be in any length.
- Other examples of account identifier may include a username, an alphanumeric or numeric record locator, and a digital file including data that can be used to identify an account.
- an “authorization request message” may be a message that includes an issuer account identifier.
- the issuer account identifier may be a payment card account identifier associated with a payment card.
- the authorization request message may request that an issuer of the payment card authorize a transaction.
- An authorization request message according to an embodiment of the invention may comply with ISO 8583, which is a standard for systems that exchange electronic transactions made by cardholders using payment cards.
- an authorization request message may include, among other data, an account identifier, one or more account attributes, an amount of the transaction (which may be any type and form of a medium of exchange such a money or points), and identification of a merchant (e.g., a merchant verification value or a merchant ID).
- an authorization request message is generated by a server computer (if the transaction is an e-commerce transaction) or a Point of Sale (POS) device (if the transaction is a brick and mortar type transaction) and is sent to an issuer via a payment processing network and an acquirer.
- POS Point of Sale
- user communication device can refer to an electronic device capable of communication with other electronic devices.
- user communication device may be a desktop computer, laptop computer, netbook computer, tablet computer (e.g. iPad), mobile phone, verification token (described in detail later) and any other electronic device that can be coupled to another electronic device either wirelessly or via a direct connection.
- Dynamic verification value can refer to a value that can be used to verify that a transaction (and in some cases a portable consumer device used to conduct a transaction) is authentic. It may be a numeric or alpha-numeric value that is generated by an algorithm (e.g. encryption algorithm) that uses account data such as account identifier and account attribute as inputs.
- algorithm e.g. encryption algorithm
- authentication request message refers to one or more data strings including data about the devices being utilized to request for a dynamic verification value from a verification entity.
- the Authentication request message is generated by a verification token or a user communication device and is sent to a server computer in the verification entity.
- the data in the authentication request message allows the verification entity to identify the verification token and/or user communication devices and may also include an account identifier of the portable consumer device.
- the data in the authenticating request message may be a serial number associated with the verification token and the user communication devices (e.g. user computer and mobile device).
- user identifier refers to a form of identification that is unique to the user.
- the user identifier may be or include biometric characteristics of the user such as fingerprint, voice signature, etc.
- the user identifier may also be in the form of an alphanumeric or numeric password and/or personal identification number and it may be in any length.
- Embodiments of the invention disclosed herein also include systems and methods for utilizing such linkage rules to verify that the transaction originates from an authorized source.
- Embodiments of the invention can also verify that the user of the portable consumer device (e.g., debit or credit card) used to conduct the transaction is an authentic user.
- the portable consumer device e.g., debit or credit card
- a portable consumer device may be tied to a particular user communication device. Also, it is possible to restrict the use of one or more user communication devices with multiple pre-designated portable consumer devices, or restrict the use of one portable consumer device with multiple pre-designated user communication devices.
- a credit card may be tied to a laptop computer. Thereafter the payment transaction related to Internet purchases must originate from the laptop computer tied to the credit card of the user. Also, the credit card may be tied to more than one computer (i.e. home computer and work computer).
- Customized linkage rules for portable consumer devices, verification tokens and user communication devices may be specified by the issuer of the portable consumer device and the payment processing network instead of, or in addition to the user.
- a user may link one portable consumer device to one or more user communication devices (or vise versa) during an enrollment process.
- the issuer may also provide a mechanism (such as website) for users to enroll and to change their customized linkage rules for the portable consumer device, verification token and user communication devices at any given time.
- an issuer may want to impose a restriction on the use of a particular verification token and/or portable consumer device with a particular user communication device.
- payment transactions may utilize a dynamic verification value (such as a dCVV2 or a “dynamic card verification value”).
- the customized linkage rules may serve as a prerequisite for requesting a dynamic verification value.
- an authentication request message may be sent from the verification token or a user communication device (e.g. mobile device), through a secure network, to a verification entity. Thereafter, the specified customized linkage rules may be checked by the verification entity to determine if the proper combination of the portable consumer device, verification token and one or more user communication devices were used in submitting an authentication request message. Upon confirmation, a dynamic verification value is generated and sent to the verification token or the user communication device.
- the dynamic verification value may then be included in an authorization request message for performing an electronic payment transaction.
- the dynamic verification value may be sent to a server computer (associated with a payment processing network), which may use the dynamic verification value for authentication of the portable consumer device used by a user to perform the electronic payment transaction. Further details regarding this process flow, can be found in U.S. patent application Ser. No. 12/712,148, filed on Feb. 24, 2010, U.S. Provisional Application No. 61/258,194, filed on Nov. 4, 2009, and U.S. Provisional Application No. 61/241,367, filed on Sep. 10, 2009 which are herein incorporated by reference in their entirety for all purposes.
- Embodiments of the present invention are able to maintain or improve existing user experiences, minimize the impact on merchant processes/systems, leverage existing network data transport mechanisms, utilize existing issuer validation infrastructure, support multiple forms of implementation, and maintain consistency with broader authentication strategy.
- FIG. 1 shows a block diagram illustrating the components of a system according to one embodiment.
- FIG. 1 shows a user 110 , a portable consumer device 112 , a mobile device 118 , a user computer 120 , a verification token 122 , a merchant website 130 , an acquirer 140 , a payment processing network 150 , an IP Gateway 152 , server computers 153 and 155 , computer readable media 154 and 157 , data processors 156 - 1 and 156 - 2 , a comparison module 158 , a database 159 , an issuer 160 , a detection module 161 , and a verification module 162 .
- the user 110 can use the portable consumer device 112 , the mobile device 118 , and the user computer 120 .
- the user 110 interacts with the merchant website 130 using the user computer 120 .
- the mobile device 118 , the verification token 122 and the user computer 120 are capable of communicating with the IP Gateway 152 for submitting an authentication request message, and requesting and receiving a dynamic verification value (this process will be described in detail later).
- the merchant website 130 is in communication with the acquirer 140 .
- the acquirer 140 is in communication with the issuer 160 through the payment processing network 150 .
- the payment processing network 150 is in communication with the IP Gateway 152 .
- the IP Gateway has access to the database 151 , the IP Gateway server computer 153 which includes a computer readable medium 154 , the processor 156 - 2 , the detection module 161 and the verification module 162 .
- the IP Gateway server computer 153 is in communication with the database 151 .
- the payment processing network 150 has access to the payment processing network server computer 155 and the database 159 .
- the server computer 155 is in communication with database 159 , and includes computer readable medium 157 , processor 156 - 1 , and comparison module 158 .
- the user 110 refers to an individual or organization such as a business that is capable of purchasing goods or services or making any suitable payment transaction with the merchant website 130 .
- the portable consumer device 112 refers to any suitable device that allows the payment transaction to be conducted with the merchant website 130 .
- the portable consumer device 112 may be in any suitable form.
- suitable portable consumer devices 112 can be hand-held and compact so that they can fit into a consumer's wallet and/or pocket (e.g., pocket-sized). They may include smart cards, magnetic stripe cards, keychain devices (such as the SpeedpassTM commercially available from Exxon-Mobil Corp.), etc.
- Other examples of portable consumer devices 112 include cellular phones, personal digital assistants (PDAs), pagers, payment cards, security cards, access cards, smart media, transponders, and the like.
- the portable consumer device 112 may be associated with an account of user 110 such as a bank account.
- Portable consumer device 112 may include a contactless element 114 that includes a processor (not shown), an antenna (not shown), computer readable media (not shown), and one or more applications stored on the computer readable media that operate in concert to allow the portable consumer device 112 to wirelessly send its stored card data to a wireless reader.
- the contactless element 114 provides Near Field Communication (NFC) capability for the portable consumer device 112 such that when the portable consumer device 112 is in close proximity of a wireless reader, the wireless reader powers the contactless element 114 and collects the card data.
- NFC Near Field Communication
- the mobile device 118 may be in any suitable form.
- suitable mobile device 118 can be hand-held and compact so that they can fit into a consumer's wallet and/or pocket (e.g., pocket-sized).
- Some examples of the mobile device 118 include desktop or laptop computers, cellular phones, personal digital assistants (PDAs), pagers, payment cards, security cards, access cards, smart media, transponders, and the like.
- PDAs personal digital assistants
- the mobile device 118 and the portable consumer device 112 are embodied in the same device.
- the user computer 120 may be a personal computer or a laptop.
- the user computer 120 may run an operating system such as Microsoft WindowsTM and may have a suitable browser such as Internet ExplorerTM.
- the verification token 122 also referred to as the “token”, is an electronic device configured to be coupled to the user computer 120 and capable of wirelessly receiving card data from the portable consumer device 112 . Elements of the verification token 122 and their operation will be described later with reference to FIG. 2 .
- the merchant website 130 may be in the form of a website hosted by one or more server computers (e.g. server computer 131 ).
- the user 110 is capable of communicating with the merchant website 130 using the user computer 120 and/or mobile device 118 .
- the acquirer 140 refers to any suitable entity that has an account with a merchant associated with the merchant website 130 .
- the issuer 160 may also be the acquirer 140 .
- the payment processing network 150 refers to a network of suitable entities that have information related to an account associated with the portable consumer device 112 .
- This information includes data associated with the account on the portable consumer device 112 such as profile information, data, and other suitable information.
- data may be stored in one or more databases such as the database 159 and accessible by one or more server computers such as the payment processing network server computer 155 .
- the payment processing network 150 may have or operate a server computer and may include a database (e.g. the server computer 155 and the database 159 ).
- the database may include any hardware, software, firmware, or combination of the preceding for storing and facilitating retrieval of information. Also, the database may use any of a variety of data structures, arrangements, and compilations to store and facilitate retrieval of information.
- the server computer may be coupled to the database and may include any hardware, software, other logic, or combination of the preceding for servicing the requests from one or more client computers.
- Server computer may comprises one or more computational apparatuses and may use any of a variety of computing structures, arrangements, and compilations for servicing the requests from one or more client computers.
- the payment processing network 150 may include data processing subsystems, networks, and operations used to support and deliver authorization services, exception file services, and clearing and settlement services.
- An exemplary payment processing network 150 may include VisaNetTM. Networks that include VisaNetTM are able to process credit card transactions, debit card transactions, and other types of commercial transactions. VisaNetTM, in particular, includes an integrated payments system (Integrated Payments system) which processes authorization requests and a Base II system which performs clearing and settlement services.
- the payment processing network 150 may use any suitable wired or wireless network, including the Internet.
- the IP Gateway 152 can refers to an entity that includes one or more servers such as IP Gateway server computer 153 which include one or more computer readable media 154 and one or more processors 156 - 2 .
- the IP Gateway 152 may also include one or more databases 151 , and have access to various issuer data, transaction data and user data used to authenticate the portable consumer devices.
- the IP Gateway 152 also generates and delivers notifications and alert messages to various delivery channels.
- the IP Gateway 152 may be part of the payment processing network 150 or may be a separate entity in communication with payment processing network 150 .
- a “server computer” is typically a powerful computer or cluster of computers.
- the server computer can be a large mainframe, a minicomputer cluster, or a group of servers functioning as a unit.
- the server computer may be a database server coupled to a Web server.
- the databases 151 and 159 may be server computers that are capable of storing data and responding to queries from client computers.
- the databases 151 and 159 may also be in the form of stand-alone hard drives connected to one or more server computers that retrieve the data from the databases 151 and 159 as result of queries from client computers.
- a “computer readable medium” or “computer readable storage medium” is typically a storage medium such a hard disk or any suitable type of data storage medium capable of storing data such as program codes.
- the comparison module 158 can be a program that monitors the stream of data in an electronic payment transaction and compare various types of data in the electronic payment transaction such as the dynamic verification value with the same type of data supplied by the IP Gateway 152 or any other entity to make sure the data that are part of the electronic payment transactions are accurate and are originated from an authorized source.
- the detection module 161 can be a program that monitors the authentication request messages from the user communication devices received by the IP Gateway 152 and determines whether the account identifier of the portable consumer device of the user (e.g. portable consumer device 112 ) is associated with one or more customized linkage rules.
- the verification module 162 can be a program that determines if the authentication request message received by a user communication device complies with the customized linkage rules associated with the portable consumer device that may be used for a payment transaction.
- the issuer 160 can be any suitable entity that may open and maintain an account associated with the portable consumer device 112 for the user 110 .
- Some examples of issuers may be a bank, a business entity such as a retail store, or a governmental entity.
- the issuer 160 may also issue the portable consumer device 112 associated with the account to the user 110 .
- FIG. 2 is a block diagram illustrating various components of the verification token 122 according to one embodiment.
- the embodiment illustrated in FIG. 2 is a USB device that includes a USB connectivity module 230 , a secure element 220 (e.g., a smart card chip), a wireless/contactless reader 210 capable of reading card data (payment data) from a portable consumer device, a built in memory 240 , a self-installing driver 250 , a form fill application 260 , a terminal application 270 , and a heartbeat application 280 .
- the verification token 122 may also have other features such as a keyboard buffer capability and a unique serial number associated with the verification token.
- the verification token 122 has no footprint on the user computer 120 with internet connectivity when it is plugged in.
- FIG. 2 illustrates a verification token 122 as something similar to a USB stick
- the verification token 122 may come in other forms.
- it may be piece of hardware or other module installed into a computer, consumer device, or other devices.
- the verification token may be housed in a computer and need not be a device that is physically separated from the computer.
- a dynamic verification value may be generated by the server computer 153 in the IP Gateway 152 and delivered to a user communication device such as the verification token 122 and the mobile device 118 .
- the dynamic verification value may be generated in response to a request from a verification token or a user communication device (e.g. mobile device 118 ) before conducting a payment transaction.
- a dynamic verification value is generated, it is sent to the verification token or the user communication device.
- the verification token 122 may be utilized in the process of performing an electronic payment transaction (this process will be described in detail below).
- a dynamic verification value may be received by a user communication device (e.g. mobile device) and the user 110 may manually enter the dynamic verification value in a payment page of a website.
- the IP Gateway server computer 153 may also send the dynamic verification value to the payment processing network server computer 155 in the payment processing network 150 .
- the payment processing network 150 may also contact the IP Gateway 152 to receive the dynamic verification value at any time.
- a processor executing computer code in the payment processing network server computer 155 associates the dynamic verification value with a corresponding account identifier(s) of user 110 .
- the account identifier(s) of the user 110 may be issued by the issuer 160 for which the payment processing network 150 handles the processing and clearing of electronic payment transactions.
- the dynamic verification value is entered in the payment page of the merchant website 130 either automatically via the verification token 122 or manually by the user 110 .
- the merchant website 130 After it receives transaction details including the payment amount and the dynamic verification value, the merchant website 130 then generates an authorization request message which is sent to the acquirer 140 .
- the acquirer 140 forwards the authorization request message to the payment processing network 150 .
- the payment processing network 150 compares the dynamic verification value included in the authorization request message, with the dynamic verification value that was received from the IP Gateway 152 (more specifically, the server computer 153 ). This is done via the comparison module 158 which runs on the payment processing network server computer 155 .
- the server computer 155 is part of an authorization system of the payment processing network 150 that utilizes a number of algorithms and employs a number of programs running on computer systems to verify and authenticate an electronic payment transaction.
- the payment processing network 150 determines whether the dynamic verification value that was included in the authorization request message matches the copy that was provided by the IP Gateway 152 . In one embodiment, the payment processing network 150 then forwards the authorization request message to the issuer 160 along with an indicator that specifies whether there was a match between the dynamic verification values. In one embodiment, if the dynamic verification values do not match, payment processing network 150 may decline the transaction on behalf of the issuer 160 . The issuer 160 or the payment processing network 150 can then generate an authorization response message which indicates whether the transaction is approved or declined. The authorization response message is forwarded to the acquirer 140 and then to the merchant 130 .
- the user 110 may receive a verification token 122 such as the one illustrated in FIG. 2 from his or her financial institution (issuer 160 , for example).
- a user may receive a verification token 122 from another entity on behalf of a financial institution.
- the user 110 can then connect the verification token 122 into the USB port of his user computer (user computer 120 , for example).
- the verification token 122 is then powered by the user computer, and it is recognized as a valid device.
- the verification token 122 can also self-install via the self-installing driver 250 (shown in FIG. 2 ), and then ping the user computer 120 to check for internet connectivity.
- the verification token 122 can then automatically attempt to establish a background SSL session to the IP Gateway 152 through a predefined IP address, using the user computer 120 , so that it can be used as a part of an authentication process.
- a terminal application 270 and heartbeat application 280 may be used to establish and maintain this connection. If the session connection is successfully established, the verification token 122 identifies itself to the IP Gateway 152 by providing its unique serial number and/or IP address.
- the user 110 When the user 110 is ready to submit his/her payment information to the merchant website 130 , he/she holds the portable consumer device 112 in close proximity of the verification token 122 .
- Card data associated with the portable consumer device 112 are received by the verification token 122 from the contactless element 114 of the portable consumer device 112 .
- the verification token 122 encrypts the card data and sends them to the IP Gateway 152 via the previously established SSL session described above.
- the IP Gateway 152 receives the encrypted data, the authenticity of the information is validated by validating the account identifier associated with the portable consumer device 112 .
- the IP Gateway 152 generates a dynamic verification value based on a predetermined algorithm, and sends the dynamic verification value to the verification token 122 .
- the dynamic verification value is automatically form-filled in the payment page of the merchant website 130 by the form-fill application 260 shown in FIG. 2 .
- the merchant website 130 When the dynamic verification value is submitted to the merchant website 130 , the merchant website 130 then generates an authorization request message which is sent to the acquirer 140 .
- Acquirer 140 passes the authorization request to the payment processing network 150 .
- Payment processing network 150 compares the dynamic verification value that is in the authorization request message from the acquirer 140 (which is received from the merchant website 130 ) to the dynamic verification value that is received from the IP Gateway 152 . This is performed by the comparison module 158 . If they match, the payment processing network 150 sends the authorization request message to the issuer 160 .
- the issuer 160 generates an authorization response message which indicates whether the transaction is approved or declined.
- the authorization response message is sent to the payment processing network 150 which then sends it to the acquirer 140 .
- the acquirer 140 informs the merchant associated with the merchant website 130 about the result.
- the user 110 requests and receives the dynamic verification value using the mobile device 118 .
- the user 110 then initiates a request by sending an SMS from the mobile device 118 to the IP Gateway 152 .
- the IP Gateway 152 receives the request, the phone number and the account identifier associated with the mobile device 118 are identified.
- the IP Gateway 152 validates the account identifier associated with the portable consumer device 112 and phone number of the mobile device 118 .
- the IP Gateway 152 generates a dynamic verification value, based on a predetermined algorithm, which is sent (via SMS) to the mobile device 118 .
- the generated dynamic verification value is also sent to the payment processing network 150 .
- user 110 enters the dynamic verification value at the payment page of the merchant website 130 along with the payment information to purchase goods or services.
- the portable consumer device 112 , the verification token 122 , the user computer 120 , mobile device 118 and a user identifier may be linked together via one or more customized linkage rules specified by the user 110 and/or imposed by the issuer 160 in a variety of combination and under a variety of conditions so that a dynamic verification value is generated when the appropriate combination of elements are involved in requesting a dynamic verification value.
- one or more customized linkage rules may be specified by the user for his portable consumer device.
- the customized linkage rules may be specified through an enrollment process in which the user specifies that certain combination of a verification token, user communication devices (e.g. user computer 120 ) and user identifier (e.g. fingerprint, user's voice signature, password, etc.) should be used for submitting an authentication request message and requesting a dynamic verification value and performing a payment transaction.
- user communication devices e.g. user computer 120
- user identifier e.g. fingerprint, user's voice signature, password, etc.
- the user 110 can enroll the account identifier (e.g. primary account number (PAN)) associated with his portable consumer device 112 through a website operated by the issuer 160 or the payment processing network 150 .
- the specified customized linkage rules may be sent to the server computer 153 in the IP Gateway 152 .
- the customized linkage rules can be saved in a database 151 .
- the customized linkage rules are then associated with the account identifier of the portable consumer device (e.g. portable consumer device 112 ) of the user.
- FIG. 3 shows a flowchart that illustrates the enrollment process.
- the user 110 selects an account identifier associated with his portable consumer device 112 so that he can specify which combination of user communication devices and user identifiers should be present when submitting an authentication request message and requesting a dynamic verification value. This is shown as step 301 . As mentioned earlier, this can be performed via a web site hosted by the issuer 160 or the IP Gateway 152 .
- step 302 user 112 is provided with the available type(s) and combination(s) of the customized linkage options that can be selected to create one or more customized linkage rules.
- step 303 the user 110 then creates one or more customized linkage rules for the his portable consumer device 112 .
- the user 110 registers the verification tokens and user communication devices during the enrollment process (step 304 ).
- the user 110 will be prompted to allow an application running on the IP Gateway server computer 153 or a server computer of the issuer 160 (not shown) to extract a unique device identifier from the user communication devices that the user 110 has identified in the customized linkage rules.
- the unique device identifiers of the user computer 120 may be the serial number of the CPU or network card of the user computer 120 .
- Mobile device 118 and verification token 122 also may have unique device identifiers associated uniquely with those devices.
- the portable consumer device 112 is associated with one or more customized linkage rules specified by the user 110 .
- the customized linkage rules can be saved in the database 151 .
- the customized linkage rules can be sent from the issuer 160 to the IP Gateway 152 which may save them into the database 151 .
- FIG. 4 shows some examples of possible customized linkage rules that may be specified by the user 110 during the enrollment process.
- Each row in the tables shown in FIG. 4 indicates an example of the elements, that are identified by the user 110 in a customized linkage rule, to be involved in submitting an authentication request message and requesting a dynamic verification value in preparation for performing a payment transaction.
- these elements are the portable consumer device (e.g., portable consumer device 112 ), verification token (e.g., verification token 122 ), user computer (e.g., user computer 120 ), mobile device (e.g., mobile device 118 ), and user identifier.
- Fields that are marked with an “X” indicate that the element that the user 110 has identified in a customized linkage rules. This indicates that the identified elements should be involved in submitting an authentication request message and requesting a dynamic verification value.
- the user 110 may specify that his portable consumer device 112 should be used along with the verification token 122 and/or user computer 120 for requesting a dynamic verification value.
- the presence of the portable consumer device 112 may not be required, since the user 110 may remember the account identifier of the portable consumer device 112 and he may manually enter the account identifier into the payment page of a merchant website, for example.
- user 110 may use his mobile device 118 to request for a dynamic verification value and perform a payment transactions. Therefore, the user 110 may also specify customized linkage rules that involve the mobile device 118 . Some examples of such customized linkage rules are shown in Table B in FIG. 4 .
- the mobile device 118 may be retrofitted with a verification token or may be adapted to be coupled with a verification token and to perform a payment transaction.
- Customized linkage rule 401 A indicates that the portable consumer device, verification token, user computer and a user identifier are tied together. Therefore, if the user wishes to perform a payment transaction, he needs to use his portable consumer device with the specified verification token and the user computer and provide a user identifier in order to receive a dynamic verification value.
- Customized linkage rule 401 B is similar to 401 A except in 401 B a mobile device is tied to the portable consumer device, verification token and the user identifier.
- Customized linkage rule 402 A indicates that the portable consumer device is tied to the verification token and the user computer.
- Customized linkage rule 402 B indicates that the portable consumer device is tied to the verification token and the mobile device.
- verification token is capable of being connected to the mobile device.
- Customized linkage rule 403 A indicates that the portable consumer device is tied with the verification token.
- Customized linkage rule 404 A indicates that the portable consumer device is tied to the user computer, and the customized linkage rule 404 B indicates that the portable consumer device is tied to the mobile device.
- Customized linkage rules 405 A and 405 B are similar to customized linkage rules 404 A and 404 B respectively, but in addition a user identifier should also be used for requesting a dynamic verification value.
- Customized linkage rule 406 A indicates that the verification token, the user computer and a user identifier are tied together.
- Customized linkage rule 406 B indicates that the verification token, the mobile device and a user identifier are tied together. Therefore, the user can use any of his portable consumer devices (e.g. credit cards) with these combination of elements to perform a payment transaction.
- Customized linkage rules 407 A and 407 B are similar to rules 406 A and 406 B except that a user identifier is not required.
- the user identifier may be an identifier that is unique to the user 110 , as mentioned earlier, the user identifier may be in the form of biometric characteristics of the user 110 such as voice signature or fingerprint. It may also be a password.
- the types of user identifiers utilized may depend on the ability of the user communication devices and the verification token to support that technology. For example, if the verification token 122 or the user computer 120 are retrofitted with a fingerprint scanner, then the user has the ability to select the fingerprint as his user identifier.
- the user 110 may be prompted to record his voice at the time of enrollment so that an audio file can be generated which represents the voice signature of the user 110 . Thereafter, when an authentication request message and a request for a dynamic verification value is received, the user 110 will be prompted to provide a sample voice signature, by reading a sentence or speaking a word, that will be used by the IP Gateway 152 to compare with the user's audio file saved by the IP Gateway 152 , (i.e. recorded at the time of enrollment) to determine whether the user voice matches with the audio file recorded during the enrollment process.
- a sentence or a word is spoken by the user 110 and recorded by a server computer (e.g. IP Gateway server computer 153 ) that hosts the enrollment website.
- a server computer e.g. IP Gateway server computer 153
- the user 110 may be provided with a phone number where he can call via his mobile device 118 and record his voice. Thereafter, when an authentication request message and a request for a dynamic verification value is received, via his mobile device 118 for example, the user 110 is prompted to submit his user identifier which in this example is his voice signature.
- FIG. 5 illustrate some examples of customized linkage rules that may be specified by the user 110 for his portable consumer devices.
- the user 110 may have four portable consumer devices each of which is associated with an account identifier. Exemplary account identifiers associated with the portable consumer devices are shown in FIG. 5 for accounts, 501 , 502 , 503 , and 504 .
- the user 110 is in possession of two verification tokens 505 and 506 , as well as two user computers 507 and 508 .
- the user 110 chooses not to specify any customized linkage rules for the account 501 . Therefore, the user 110 is able to resume using the portable consumer device associated with the account 501 without having to use any particular verification token and user computer to perform payment transactions.
- a customized linkage rule is set by the user 110 so that account 502 is linked with the user computer 507 . Therefore, whenever the user 110 wishes to request for a dynamic verification value, the request should be made with user computer 507 .
- the user 110 may use any verification token for requesting a dynamic verification value as long as that verification token is used with the user computer 507 .
- a customized linkage rule is set so that account 503 is linked with the verification token 506 and user computer 507 .
- the user computer 507 is required for requesting a dynamic verification value if the amount of purchase is greater than $500.00. Therefore, in this specific example, when the user 110 uses a portable consumer device associated with the account 504 , verification token 506 should be used for requesting a dynamic verification value. In addition, if the purchase amount is greater than $500.00, then user computer 507 must be used with the verification token 506 for requesting the dynamic verification value. This may advantageously allow the user 110 to perform the payment transactions that involve higher amounts with more security.
- a customized linkage rule is specified so that account 504 is linked with verification token 505 and user computers 507 and 508 .
- a dynamic verification value can be requested for account 504 as long as the verification token 505 and any on one of the user computers 507 or 508 are used.
- Table B in FIG. 5 shows another customized linkage rule that does not involve any particular portable consumer device and account identifier.
- the user 110 may have a verification token that may be used with many different types of portable consumer devices that may be used to perform payment transactions across multiple payment processing networks.
- the user 110 links the verification token 506 with the user computer 508 . Therefore, regardless of which portable consumer device is used, a dynamic verification value may be requested as long as the verification token 506 is connected with the user computer 508 .
- the account identifier of the portable consumer devices and the device identification of the verification token, and the user communication devices are used to check the customized linkage rules.
- the IP Gateway 152 can save a unique device identification of user communication devices (e.g. user computer and mobile device) and verification tokens in addition to an account identifier associated with the portable consumer device in the database 151 .
- the IP Gateway 152 can obtain the device identification of the use communication devices that are used in the process of requesting a dynamic verification value and compare the device identification of the user communication devices with the ones saved in the database 151 to determine whether the verification token and the user communication device devices are authentic.
- FIG. 5 illustrates exemplary account identifier for accounts 501 - 504 and exemplary device identification for verification tokens 505 and 506 and user computers 507 and 508 .
- the device identification of the user computer may be a serial number associated with the CPU.
- the device identifier of the verification tokens and the user computer may be in any suitable format (i.e. numeric or alphanumeric) and may be in any length.
- FIG. 6 illustrates a flowchart that shows the process involved in receiving an authentication request message and a request for a dynamic verification value at the IP Gateway 152 , and generating a dynamic verification value.
- the IP Gateway server computer 153 in the IP Gateway 152 receives an authentication request message which can be a request for a dynamic verification value.
- the detection module 161 which may be embodied as a program stored on the computer readable medium (CRM) 154 that is being run by the processor 156 - 2 , checks to see if the incoming request is associated with an account identifier that has customized linkage rules (step 602 ).
- CRM computer readable medium
- the account identifier of the portable consumer device of the user 110 (e.g. portable consumer device 112 ) is associated with one or more customized linkage rules specified by the user 110 .
- the customized linkage rules may then be saved in the database 151 .
- the detection module 161 can search the database 151 to determine whether the account identifier of the portable consumer device that was received as part of the data in the authentication request message is associated with any customized linkage rules.
- the verification module 162 can determine whether the authentication request message complies with the specified customized linkage rules. Similar to the detection module 161 , the verification module 162 may be embodied as a program stored on the computer readable medium (CRM) 154 and run by the processor 156 - 2 .
- CRM computer readable medium
- the unique device identifiers of the user communication devices such the verification token 122 , user computer 120 and mobile device 118 that are identified by the user 110 to be part of the customized linkage rules are obtained during the enrollment process.
- the authentication request message can include the unique device identifiers of the user communication devices and/or verification tokens that are being used to generate and submit the authentication request message.
- the verification module 162 analyses the authentication request message to determine whether the user and/or the user communication devices being used are authentic. In this analysis, the verification module 162 may compare the unique device identifiers of the user communication devices and verification tokens identified in the authentication request message with the unique device identifiers associated with the account identifier in the database 151 .
- the verification module 162 checks the customized linkage rule to determine the types of the user communication devices that must be used in an authentication request message. If the customized linkage rules indicates that both the user computer and the verification token must be used for the request, then the verification module 162 compares the unique device identifiers of the user computer 120 and the verification token 122 with the ones saved in the database 151 to determine if they are the same devices that were identified by the user 110 during the enrollment process.
- the verification module 162 prompts the user to provide such user identifiers.
- the issuer 160 may impose a linkage rule for an account identifier associated with the portable consumer device 112 .
- the linkage rules specified by the issuer 160 can also be saved in the database 151 .
- the verification module 162 can check the authentication request message to determine if it complies with the issuer specific linkage rules.
- the IP Gateway 152 denies the request and may notify the user 110 that a dynamic verification value will not be generated.
- step 605 the IP Gateway 152 generates a dynamic verification value.
- step 606 a the dynamic verification value is sent to the verification token 122 and in step 606 b the dynamic verification value is send to the payment processing network 150 .
- the dynamic verification value is automatically form-filled in the payment page of the merchant website 130 by the form-fill application 260 shown in FIG. 2 .
- the merchant website then generates an authorization request message that will be sent to the acquirer 140 .
- Acquirer 140 then forwards the authorization request message to the payment processing network 150 .
- the comparison module 158 compares the dynamic verification value that was part of the authorization request message with the dynamic verification value that was received from the IP Gateway 152 . If the dynamic verification values match, the payment processing network 150 forwards the authorization request message to the issuer 160 .
- the IP Gateway 152 may indicate to the payment processing network 150 that once the authorization request message arrives with the purchase price, the customized linkage rules should be once again visited by the verification module 162 to determine whether the final purchase price violates the specified customized linkage rule. If the customized linkage rule is violated, then the payment processing network may decline the transaction.
- the payment processing network 150 may provide a list of user communication devices such a user computers that were involved in fraudulent transactions and therefore should be blacklisted.
- the IP Gateway 152 can store the unique device identifiers of such user communication devices and verification tokens in the database 151 so that for each request for a dynamic verification value the list of unauthorized user communication devices (also referred to as the blacklist) is checked to see if the request is coming from a device that has been blacklisted by the payment processing network 150 and a dynamic verification value should not be generated.
- a fraudster may use a stolen verification token with a user computer in a public library in an attempt to perform a fraudulent payment transaction. Upon discovering that the verification token was involved in a fraudulent transaction, the verification token may be blacklisted and future authentication requests from that verification token may be denied. In addition, if it is determined that a user computer in a public library is also being frequently used by fraudsters to perform fraudulent payment transactions, then the user computer may also be blacklisted.
- the embodiments of this novel invention provide many advantages.
- the ability to establish customized linkage rules provides a great level of security for payment transactions.
- the embodiments of the invention can substantially reduce the occurrence of unauthorized and fraudulent transactions.
- a customized linkage rule indicates that a request for a dynamic verification value should come from a personal computer of the user, then even if a fraudster can find the personal information of the user, he cannot perform a payment transaction.
- FIG. 7 The various participants and elements of the system shown in FIG. 1 may operate one or more computer apparatuses to facilitate the functions described herein. Any of the elements in FIG. 1 may use any suitable number of subsystems to facilitate the functions described herein. Examples of such subsystems or components are shown in FIG. 7 .
- the subsystems shown in FIG. 7 are interconnected via a system bus 775 . Additional subsystems such as a printer 774 , keyboard 778 , fixed disk 779 (or other memory comprising computer readable media), monitor 776 , which is coupled to display adapter 782 , and others are shown.
- Peripherals and input/output (I/O) devices which couple to I/O controller 771 , can be connected to the computer system by any number of means known in the art, such as serial port 777 .
- serial port 777 or external interface 781 can be used to connect the computer apparatus to a wide area network such as the Internet, a mouse input device, or a scanner.
- the interconnection via system bus allows the central processor 773 to communicate with each subsystem and to control the execution of instructions from system memory 772 or the fixed disk 779 , as well as the exchange of information between subsystems.
- the system memory 772 and/or the fixed disk 779 may embody a computer readable medium.
- the software components or functions described in this application may be implemented as software code to be executed by one or more processors using any suitable computer language such as, for example, Java, C++ or Perl using, for example, conventional or object-oriented techniques.
- the software code may be stored as a series of instructions, or commands on a computer-readable medium, such as a random access memory (RAM), a read-only memory (ROM), a magnetic medium such as a hard-drive or a floppy disk, or an optical medium such as a CD-ROM. Any such computer-readable medium may also reside on or within a single computational apparatus, and may be present on or within different computational apparatuses within a system or network.
- Embodiments of the present invention can be implemented in the form of control logic in software or hardware or a combination of both.
- the control logic may be stored in an information storage medium as a plurality of instructions adapted to direct an information processing device to perform a set of steps disclosed in embodiments of the present invention. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will appreciate other ways and/or methods to implement the present invention.
- any of the entities described herein may be embodied by a computer that performs any or all of the functions and steps disclosed.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Computer Security & Cryptography (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
- This is a non-provisional application and claims priority from the provisional patent application No. 61/312,196, filed on Mar. 9, 2010, entitled “System and Method Including Dynamic Card Verification Value,” which is incorporated herein by reference in its entirety for all purposes.
- There is a need for more secure data transfer when paying for goods and services using payment cards such as debit and credit cards.
- In a typical payment transaction, a user may use a credit card to purchase an item at a merchant or enter his account information into a payment page of a merchant's website. The merchant then generates an authorization request message using a POS (point of sale) terminal when the user is present at the merchant location. Alternatively, for an online transaction, the merchant website may generate an authorization request message for card-not-present (CNP) transactions. In either instance, the authorization request message is passed to the issuer of the credit card, and the issuer may approve or deny the request to authorize the transaction.
- There are a variety of methods by which fraudsters attempt to obtain account information of users for conducting fraudulent transactions. To address this problem, there is a need for making electronic payment transactions partially dependent on devices that are known to be in the possession of the user (account holder) of the credit or debit card.
- Embodiments of the invention address these and other problems, individually and collectively.
- Embodiments of the invention disclosed herein include systems and methods for generating dynamic verification values for use in the electronic payment transactions.
- One embodiment of the invention is directed to receiving an authentication request message including a verification token identifier associated with a verification token, a user communication device identifier associated with a communication device, and an account identifier associated with a portable consumer device; and analyzing the verification token identifier, the user communication device identifier, and the account identifier in the authentication request message to determine if a user using the verification token, the user communication device and the portable consumer device is an authentic user.
- Another embodiment of the invention is directed to determining whether the account identifier associated with the portable consumer device is associated with one or more customized linkage rules, and determining whether the authentication request message complies with the one or more customized linkage rules.
- Another embodiment of the invention is directed to prompting a user to provide a user identifier if the customized linkage rules indicate that the user identifier is required from the user. The user identifiers include any one of a voice signature of the user, fingerprint of the user or a password.
- Another embodiment of the invention is directed to generating a dynamic verification value if the authentication request message complies with the one or more customized linkage rules, and sending the dynamic verification value to the verification token, and to a server computer in communication with a payment processing network.
- Another embodiment of the invention is directed to an enrollment process where an account identifier is received from a user, and the user is provided with one or more customized linkage options. The user then identifies one or more customized linkage rules from the customized linkage options. The user communication devices and/or verification tokens identified in the customized linkage rules are registered and the account identifier is associated with the customized linkage rules.
- These and other embodiments of the invention are described in further detail below.
-
FIG. 1 shows a system according to an embodiment of the invention. -
FIG. 2 shows a user communication device according to an embodiment of the invention. -
FIG. 3 illustrates a flowchart that shows the steps involved in enrollment process according to an embodiment of the invention. -
FIG. 4 shows two tables that show some possible customized linkage rules. -
FIG. 5 shows some examples of customized linkage rules according to an embodiment of the invention. -
FIG. 6 illustrates a flowchart that illustrates the steps involved in checking the customized linkage rules and generating a dynamic verification value according to an embodiment of the invention. -
FIG. 7 shows a system according to an embodiment of the invention. - In order to provide more security for electronic payment transactions, a portable consumer device (e.g. credit and debit card), a verification token and one or more user communication devices (e.g. a user computer) that are known to be owned and/or used by the user for performing electronic payment transactions may be identified by the user to be linked together in a variety of combinations and under a variety of conditions. Thereafter, a payment transaction that originates from the specified combination of the verification token, portable consumer device and one or more user communication devices is determined to be authentic and originated from an authorized source. In contrast, a payment transaction that that originates without the presence of the identified combination of the portable consumer device, verification token and one or more user communication devices may be determined not to be authentic.
- Embodiments of the invention disclosed herein include systems and methods for linking portable consumer devices (e.g. a credit/debit card), user communication devices (e.g. a laptop computer), verification tokens, and user specific identifiers (e.g. fingerprint, password, user voice signature, etc.) and establishing one or more customized linkage rules associated with an account identifier associated with the portable consumer device.
- Account identifier—As used herein, “account identifier” refers to a means of identifying a financial account associated with a consumer (i.e. user) using which the consumer engages in financial activity. For example, an account identifier may be a Primary Account Number (PAN) of a credit and/or debit card. The Primary Account Number (PAN) may include numbers and/or letters and may be in any length. Other examples of account identifier may include a username, an alphanumeric or numeric record locator, and a digital file including data that can be used to identify an account.
- Authorization request message—As used herein, an “authorization request message” may be a message that includes an issuer account identifier. The issuer account identifier may be a payment card account identifier associated with a payment card. The authorization request message may request that an issuer of the payment card authorize a transaction. An authorization request message according to an embodiment of the invention may comply with ISO 8583, which is a standard for systems that exchange electronic transactions made by cardholders using payment cards. In embodiments of the invention, an authorization request message may include, among other data, an account identifier, one or more account attributes, an amount of the transaction (which may be any type and form of a medium of exchange such a money or points), and identification of a merchant (e.g., a merchant verification value or a merchant ID). Typically, an authorization request message is generated by a server computer (if the transaction is an e-commerce transaction) or a Point of Sale (POS) device (if the transaction is a brick and mortar type transaction) and is sent to an issuer via a payment processing network and an acquirer.
- User communication device—As used herein, “user communication device” can refer to an electronic device capable of communication with other electronic devices. For example, user communication device may be a desktop computer, laptop computer, netbook computer, tablet computer (e.g. iPad), mobile phone, verification token (described in detail later) and any other electronic device that can be coupled to another electronic device either wirelessly or via a direct connection.
- Dynamic verification value—As used herein “dynamic verification value” (e.g., a dynamic device verification value, a dynamic card verification value, and a dCVV2 value) can refer to a value that can be used to verify that a transaction (and in some cases a portable consumer device used to conduct a transaction) is authentic. It may be a numeric or alpha-numeric value that is generated by an algorithm (e.g. encryption algorithm) that uses account data such as account identifier and account attribute as inputs.
- Authentication request message—As used herein, “authentication request message” refers to one or more data strings including data about the devices being utilized to request for a dynamic verification value from a verification entity. The Authentication request message is generated by a verification token or a user communication device and is sent to a server computer in the verification entity. The data in the authentication request message allows the verification entity to identify the verification token and/or user communication devices and may also include an account identifier of the portable consumer device. For example, the data in the authenticating request message may be a serial number associated with the verification token and the user communication devices (e.g. user computer and mobile device).
- User identifier—As used herein, “user identifier” refers to a form of identification that is unique to the user. The user identifier may be or include biometric characteristics of the user such as fingerprint, voice signature, etc. The user identifier may also be in the form of an alphanumeric or numeric password and/or personal identification number and it may be in any length.
- Embodiments of the invention disclosed herein also include systems and methods for utilizing such linkage rules to verify that the transaction originates from an authorized source. Embodiments of the invention can also verify that the user of the portable consumer device (e.g., debit or credit card) used to conduct the transaction is an authentic user.
- In the embodiments of the invention, a portable consumer device may be tied to a particular user communication device. Also, it is possible to restrict the use of one or more user communication devices with multiple pre-designated portable consumer devices, or restrict the use of one portable consumer device with multiple pre-designated user communication devices.
- For example, a credit card may be tied to a laptop computer. Thereafter the payment transaction related to Internet purchases must originate from the laptop computer tied to the credit card of the user. Also, the credit card may be tied to more than one computer (i.e. home computer and work computer).
- Customized linkage rules for portable consumer devices, verification tokens and user communication devices may be specified by the issuer of the portable consumer device and the payment processing network instead of, or in addition to the user. In some embodiments, a user may link one portable consumer device to one or more user communication devices (or vise versa) during an enrollment process. The issuer may also provide a mechanism (such as website) for users to enroll and to change their customized linkage rules for the portable consumer device, verification token and user communication devices at any given time. In some embodiments, an issuer may want to impose a restriction on the use of a particular verification token and/or portable consumer device with a particular user communication device.
- In the embodiments of the invention, payment transactions may utilize a dynamic verification value (such as a dCVV2 or a “dynamic card verification value”). The customized linkage rules may serve as a prerequisite for requesting a dynamic verification value. In such embodiments, an authentication request message may be sent from the verification token or a user communication device (e.g. mobile device), through a secure network, to a verification entity. Thereafter, the specified customized linkage rules may be checked by the verification entity to determine if the proper combination of the portable consumer device, verification token and one or more user communication devices were used in submitting an authentication request message. Upon confirmation, a dynamic verification value is generated and sent to the verification token or the user communication device.
- The dynamic verification value may then be included in an authorization request message for performing an electronic payment transaction. The dynamic verification value may be sent to a server computer (associated with a payment processing network), which may use the dynamic verification value for authentication of the portable consumer device used by a user to perform the electronic payment transaction. Further details regarding this process flow, can be found in U.S. patent application Ser. No. 12/712,148, filed on Feb. 24, 2010, U.S. Provisional Application No. 61/258,194, filed on Nov. 4, 2009, and U.S. Provisional Application No. 61/241,367, filed on Sep. 10, 2009 which are herein incorporated by reference in their entirety for all purposes.
- Embodiments of the present invention are able to maintain or improve existing user experiences, minimize the impact on merchant processes/systems, leverage existing network data transport mechanisms, utilize existing issuer validation infrastructure, support multiple forms of implementation, and maintain consistency with broader authentication strategy.
-
FIG. 1 shows a block diagram illustrating the components of a system according to one embodiment.FIG. 1 shows auser 110, aportable consumer device 112, amobile device 118, a user computer 120, averification token 122, amerchant website 130, anacquirer 140, apayment processing network 150, anIP Gateway 152,server computers readable media comparison module 158, adatabase 159, anissuer 160, adetection module 161, and averification module 162. - The
user 110 can use theportable consumer device 112, themobile device 118, and the user computer 120. Theuser 110 interacts with themerchant website 130 using the user computer 120. Themobile device 118, theverification token 122 and the user computer 120 are capable of communicating with theIP Gateway 152 for submitting an authentication request message, and requesting and receiving a dynamic verification value (this process will be described in detail later). Themerchant website 130 is in communication with theacquirer 140. Theacquirer 140 is in communication with theissuer 160 through thepayment processing network 150. Thepayment processing network 150 is in communication with theIP Gateway 152. The IP Gateway has access to thedatabase 151, the IPGateway server computer 153 which includes a computerreadable medium 154, the processor 156-2, thedetection module 161 and theverification module 162. The IPGateway server computer 153 is in communication with thedatabase 151. Thepayment processing network 150 has access to the payment processingnetwork server computer 155 and thedatabase 159. Theserver computer 155 is in communication withdatabase 159, and includes computerreadable medium 157, processor 156-1, andcomparison module 158. - The
user 110 refers to an individual or organization such as a business that is capable of purchasing goods or services or making any suitable payment transaction with themerchant website 130. - The
portable consumer device 112 refers to any suitable device that allows the payment transaction to be conducted with themerchant website 130. Theportable consumer device 112 may be in any suitable form. For example, suitableportable consumer devices 112 can be hand-held and compact so that they can fit into a consumer's wallet and/or pocket (e.g., pocket-sized). They may include smart cards, magnetic stripe cards, keychain devices (such as the Speedpass™ commercially available from Exxon-Mobil Corp.), etc. Other examples ofportable consumer devices 112 include cellular phones, personal digital assistants (PDAs), pagers, payment cards, security cards, access cards, smart media, transponders, and the like. In some cases, theportable consumer device 112 may be associated with an account ofuser 110 such as a bank account. -
Portable consumer device 112 may include acontactless element 114 that includes a processor (not shown), an antenna (not shown), computer readable media (not shown), and one or more applications stored on the computer readable media that operate in concert to allow theportable consumer device 112 to wirelessly send its stored card data to a wireless reader. Thecontactless element 114 provides Near Field Communication (NFC) capability for theportable consumer device 112 such that when theportable consumer device 112 is in close proximity of a wireless reader, the wireless reader powers thecontactless element 114 and collects the card data. - The
mobile device 118 may be in any suitable form. For example, suitablemobile device 118 can be hand-held and compact so that they can fit into a consumer's wallet and/or pocket (e.g., pocket-sized). Some examples of themobile device 118 include desktop or laptop computers, cellular phones, personal digital assistants (PDAs), pagers, payment cards, security cards, access cards, smart media, transponders, and the like. In some embodiments, themobile device 118 and theportable consumer device 112 are embodied in the same device. - The user computer 120 may be a personal computer or a laptop. The user computer 120 may run an operating system such as Microsoft Windows™ and may have a suitable browser such as Internet Explorer™.
- The
verification token 122, also referred to as the “token”, is an electronic device configured to be coupled to the user computer 120 and capable of wirelessly receiving card data from theportable consumer device 112. Elements of theverification token 122 and their operation will be described later with reference toFIG. 2 . - The
merchant website 130 may be in the form of a website hosted by one or more server computers (e.g. server computer 131). Theuser 110 is capable of communicating with themerchant website 130 using the user computer 120 and/ormobile device 118. - The
acquirer 140 refers to any suitable entity that has an account with a merchant associated with themerchant website 130. In some embodiments, theissuer 160 may also be theacquirer 140. - The
payment processing network 150 refers to a network of suitable entities that have information related to an account associated with theportable consumer device 112. This information includes data associated with the account on theportable consumer device 112 such as profile information, data, and other suitable information. Such data may be stored in one or more databases such as thedatabase 159 and accessible by one or more server computers such as the payment processingnetwork server computer 155. - The
payment processing network 150 may have or operate a server computer and may include a database (e.g. theserver computer 155 and the database 159). The database may include any hardware, software, firmware, or combination of the preceding for storing and facilitating retrieval of information. Also, the database may use any of a variety of data structures, arrangements, and compilations to store and facilitate retrieval of information. The server computer may be coupled to the database and may include any hardware, software, other logic, or combination of the preceding for servicing the requests from one or more client computers. Server computer may comprises one or more computational apparatuses and may use any of a variety of computing structures, arrangements, and compilations for servicing the requests from one or more client computers. - The
payment processing network 150 may include data processing subsystems, networks, and operations used to support and deliver authorization services, exception file services, and clearing and settlement services. An exemplarypayment processing network 150 may include VisaNet™. Networks that include VisaNet™ are able to process credit card transactions, debit card transactions, and other types of commercial transactions. VisaNet™, in particular, includes an integrated payments system (Integrated Payments system) which processes authorization requests and a Base II system which performs clearing and settlement services. Thepayment processing network 150 may use any suitable wired or wireless network, including the Internet. - The
IP Gateway 152 can refers to an entity that includes one or more servers such as IPGateway server computer 153 which include one or more computerreadable media 154 and one or more processors 156-2. TheIP Gateway 152 may also include one ormore databases 151, and have access to various issuer data, transaction data and user data used to authenticate the portable consumer devices. TheIP Gateway 152 also generates and delivers notifications and alert messages to various delivery channels. TheIP Gateway 152 may be part of thepayment processing network 150 or may be a separate entity in communication withpayment processing network 150. - As used herein, a “server computer” is typically a powerful computer or cluster of computers. For example, the server computer can be a large mainframe, a minicomputer cluster, or a group of servers functioning as a unit. In one example, the server computer may be a database server coupled to a Web server.
- The
databases databases databases - As used herein a “computer readable medium” or “computer readable storage medium” is typically a storage medium such a hard disk or any suitable type of data storage medium capable of storing data such as program codes.
- The
comparison module 158 can be a program that monitors the stream of data in an electronic payment transaction and compare various types of data in the electronic payment transaction such as the dynamic verification value with the same type of data supplied by theIP Gateway 152 or any other entity to make sure the data that are part of the electronic payment transactions are accurate and are originated from an authorized source. - The
detection module 161 can be a program that monitors the authentication request messages from the user communication devices received by theIP Gateway 152 and determines whether the account identifier of the portable consumer device of the user (e.g. portable consumer device 112) is associated with one or more customized linkage rules. - The
verification module 162 can be a program that determines if the authentication request message received by a user communication device complies with the customized linkage rules associated with the portable consumer device that may be used for a payment transaction. - The
issuer 160 can be any suitable entity that may open and maintain an account associated with theportable consumer device 112 for theuser 110. Some examples of issuers may be a bank, a business entity such as a retail store, or a governmental entity. In many cases, theissuer 160 may also issue theportable consumer device 112 associated with the account to theuser 110. -
FIG. 2 is a block diagram illustrating various components of theverification token 122 according to one embodiment. - The embodiment illustrated in
FIG. 2 is a USB device that includes a USB connectivity module 230, a secure element 220 (e.g., a smart card chip), a wireless/contactless reader 210 capable of reading card data (payment data) from a portable consumer device, a built inmemory 240, a self-installingdriver 250, aform fill application 260, aterminal application 270, and aheartbeat application 280. Theverification token 122 may also have other features such as a keyboard buffer capability and a unique serial number associated with the verification token. Theverification token 122 has no footprint on the user computer 120 with internet connectivity when it is plugged in. These various components and modules on theverification token 122 can be used to implement the methods described in more detail below. - Although
FIG. 2 illustrates averification token 122 as something similar to a USB stick, theverification token 122 may come in other forms. For example, it may be piece of hardware or other module installed into a computer, consumer device, or other devices. For example, in other embodiments, the verification token may be housed in a computer and need not be a device that is physically separated from the computer. - In the embodiments of the invention, a dynamic verification value may be generated by the
server computer 153 in theIP Gateway 152 and delivered to a user communication device such as theverification token 122 and themobile device 118. The dynamic verification value may be generated in response to a request from a verification token or a user communication device (e.g. mobile device 118) before conducting a payment transaction. When a dynamic verification value is generated, it is sent to the verification token or the user communication device. In some embodiments, theverification token 122, may be utilized in the process of performing an electronic payment transaction (this process will be described in detail below). In some embodiments, a dynamic verification value may be received by a user communication device (e.g. mobile device) and theuser 110 may manually enter the dynamic verification value in a payment page of a website. - Before or after sending the dynamic verification value to a verification token or user communication device, the IP
Gateway server computer 153 may also send the dynamic verification value to the payment processingnetwork server computer 155 in thepayment processing network 150. In one embodiment, thepayment processing network 150 may also contact theIP Gateway 152 to receive the dynamic verification value at any time. A processor executing computer code in the payment processingnetwork server computer 155 associates the dynamic verification value with a corresponding account identifier(s) ofuser 110. The account identifier(s) of theuser 110 may be issued by theissuer 160 for which thepayment processing network 150 handles the processing and clearing of electronic payment transactions. - When the
user 110 purchases goods or services from themerchant website 130 using the user computer 120, the dynamic verification value is entered in the payment page of themerchant website 130 either automatically via theverification token 122 or manually by theuser 110. - After it receives transaction details including the payment amount and the dynamic verification value, the
merchant website 130 then generates an authorization request message which is sent to theacquirer 140. Theacquirer 140 forwards the authorization request message to thepayment processing network 150. Upon receipt of the authorization request message, thepayment processing network 150 compares the dynamic verification value included in the authorization request message, with the dynamic verification value that was received from the IP Gateway 152 (more specifically, the server computer 153). This is done via thecomparison module 158 which runs on the payment processingnetwork server computer 155. In some embodiments, theserver computer 155 is part of an authorization system of thepayment processing network 150 that utilizes a number of algorithms and employs a number of programs running on computer systems to verify and authenticate an electronic payment transaction. - The
payment processing network 150 determines whether the dynamic verification value that was included in the authorization request message matches the copy that was provided by theIP Gateway 152. In one embodiment, thepayment processing network 150 then forwards the authorization request message to theissuer 160 along with an indicator that specifies whether there was a match between the dynamic verification values. In one embodiment, if the dynamic verification values do not match,payment processing network 150 may decline the transaction on behalf of theissuer 160. Theissuer 160 or thepayment processing network 150 can then generate an authorization response message which indicates whether the transaction is approved or declined. The authorization response message is forwarded to theacquirer 140 and then to themerchant 130. - Two specific embodiments in which the
user 110 may use a verification token and a user communication device to request and receive a dynamic verification value will now be described. It will be understood by those skilled in the art that other means may be used to request, receive and use the dynamic verification value to conduct an electronic transaction, and that the following descriptions are not indented to be limiting. - Referring to
FIG. 1 , in an embodiment of the invention, theuser 110 may receive averification token 122 such as the one illustrated inFIG. 2 from his or her financial institution (issuer 160, for example). Alternatively, a user may receive averification token 122 from another entity on behalf of a financial institution. - The
user 110 can then connect theverification token 122 into the USB port of his user computer (user computer 120, for example). Theverification token 122 is then powered by the user computer, and it is recognized as a valid device. Theverification token 122 can also self-install via the self-installing driver 250 (shown inFIG. 2 ), and then ping the user computer 120 to check for internet connectivity. - If Internet connectivity is available, the
verification token 122 can then automatically attempt to establish a background SSL session to theIP Gateway 152 through a predefined IP address, using the user computer 120, so that it can be used as a part of an authentication process. Aterminal application 270 andheartbeat application 280 may be used to establish and maintain this connection. If the session connection is successfully established, theverification token 122 identifies itself to theIP Gateway 152 by providing its unique serial number and/or IP address. - When the
user 110 is ready to submit his/her payment information to themerchant website 130, he/she holds theportable consumer device 112 in close proximity of theverification token 122. Card data associated with theportable consumer device 112 are received by theverification token 122 from thecontactless element 114 of theportable consumer device 112. Theverification token 122 encrypts the card data and sends them to theIP Gateway 152 via the previously established SSL session described above. When theIP Gateway 152 receives the encrypted data, the authenticity of the information is validated by validating the account identifier associated with theportable consumer device 112. TheIP Gateway 152 generates a dynamic verification value based on a predetermined algorithm, and sends the dynamic verification value to theverification token 122. The dynamic verification value is automatically form-filled in the payment page of themerchant website 130 by the form-fill application 260 shown inFIG. 2 . - When the dynamic verification value is submitted to the
merchant website 130, themerchant website 130 then generates an authorization request message which is sent to theacquirer 140.Acquirer 140 passes the authorization request to thepayment processing network 150.Payment processing network 150 compares the dynamic verification value that is in the authorization request message from the acquirer 140 (which is received from the merchant website 130) to the dynamic verification value that is received from theIP Gateway 152. This is performed by thecomparison module 158. If they match, thepayment processing network 150 sends the authorization request message to theissuer 160. Theissuer 160 generates an authorization response message which indicates whether the transaction is approved or declined. The authorization response message is sent to thepayment processing network 150 which then sends it to theacquirer 140. Theacquirer 140 informs the merchant associated with themerchant website 130 about the result. - In another embodiment, the
user 110 requests and receives the dynamic verification value using themobile device 118. Theuser 110 then initiates a request by sending an SMS from themobile device 118 to theIP Gateway 152. When theIP Gateway 152 receives the request, the phone number and the account identifier associated with themobile device 118 are identified. TheIP Gateway 152 then validates the account identifier associated with theportable consumer device 112 and phone number of themobile device 118. TheIP Gateway 152 generates a dynamic verification value, based on a predetermined algorithm, which is sent (via SMS) to themobile device 118. The generated dynamic verification value is also sent to thepayment processing network 150. Then,user 110 enters the dynamic verification value at the payment page of themerchant website 130 along with the payment information to purchase goods or services. - To add more security to the above described process, the
portable consumer device 112, theverification token 122, the user computer 120,mobile device 118 and a user identifier may be linked together via one or more customized linkage rules specified by theuser 110 and/or imposed by theissuer 160 in a variety of combination and under a variety of conditions so that a dynamic verification value is generated when the appropriate combination of elements are involved in requesting a dynamic verification value. - In the embodiments of the invention, one or more customized linkage rules may be specified by the user for his portable consumer device. The customized linkage rules may be specified through an enrollment process in which the user specifies that certain combination of a verification token, user communication devices (e.g. user computer 120) and user identifier (e.g. fingerprint, user's voice signature, password, etc.) should be used for submitting an authentication request message and requesting a dynamic verification value and performing a payment transaction.
- The
user 110 can enroll the account identifier (e.g. primary account number (PAN)) associated with hisportable consumer device 112 through a website operated by theissuer 160 or thepayment processing network 150. In either case, the specified customized linkage rules may be sent to theserver computer 153 in theIP Gateway 152. The customized linkage rules can be saved in adatabase 151. The customized linkage rules are then associated with the account identifier of the portable consumer device (e.g. portable consumer device 112) of the user. -
FIG. 3 shows a flowchart that illustrates the enrollment process. First, theuser 110 selects an account identifier associated with hisportable consumer device 112 so that he can specify which combination of user communication devices and user identifiers should be present when submitting an authentication request message and requesting a dynamic verification value. This is shown asstep 301. As mentioned earlier, this can be performed via a web site hosted by theissuer 160 or theIP Gateway 152. Instep 302,user 112 is provided with the available type(s) and combination(s) of the customized linkage options that can be selected to create one or more customized linkage rules. - In step 303 (
FIG. 3 ), theuser 110 then creates one or more customized linkage rules for the hisportable consumer device 112. Theuser 110 then registers the verification tokens and user communication devices during the enrollment process (step 304). In some embodiments, theuser 110 will be prompted to allow an application running on the IPGateway server computer 153 or a server computer of the issuer 160 (not shown) to extract a unique device identifier from the user communication devices that theuser 110 has identified in the customized linkage rules. The unique device identifiers of the user computer 120 may be the serial number of the CPU or network card of the user computer 120.Mobile device 118 andverification token 122 also may have unique device identifiers associated uniquely with those devices. - Thereafter, in
step 305, theportable consumer device 112 is associated with one or more customized linkage rules specified by theuser 110. The customized linkage rules can be saved in thedatabase 151. In the embodiments where theissuer 160 receives the customized linkage rules from theuser 110, the customized linkage rules can be sent from theissuer 160 to theIP Gateway 152 which may save them into thedatabase 151. -
FIG. 4 , shows some examples of possible customized linkage rules that may be specified by theuser 110 during the enrollment process. Each row in the tables shown inFIG. 4 , indicates an example of the elements, that are identified by theuser 110 in a customized linkage rule, to be involved in submitting an authentication request message and requesting a dynamic verification value in preparation for performing a payment transaction. As shown in the tables ofFIG. 4 , these elements are the portable consumer device (e.g., portable consumer device 112), verification token (e.g., verification token 122), user computer (e.g., user computer 120), mobile device (e.g., mobile device 118), and user identifier. Fields that are marked with an “X” indicate that the element that theuser 110 has identified in a customized linkage rules. This indicates that the identified elements should be involved in submitting an authentication request message and requesting a dynamic verification value. - In some embodiments, the
user 110 may specify that hisportable consumer device 112 should be used along with theverification token 122 and/or user computer 120 for requesting a dynamic verification value. In some embodiments, the presence of theportable consumer device 112 may not be required, since theuser 110 may remember the account identifier of theportable consumer device 112 and he may manually enter the account identifier into the payment page of a merchant website, for example. - As described earlier,
user 110 may use hismobile device 118 to request for a dynamic verification value and perform a payment transactions. Therefore, theuser 110 may also specify customized linkage rules that involve themobile device 118. Some examples of such customized linkage rules are shown in Table B inFIG. 4 . Themobile device 118 may be retrofitted with a verification token or may be adapted to be coupled with a verification token and to perform a payment transaction. - Tables A and B in
FIG. 4 illustrate some exemplary customized linkage rules.Customized linkage rule 401A indicates that the portable consumer device, verification token, user computer and a user identifier are tied together. Therefore, if the user wishes to perform a payment transaction, he needs to use his portable consumer device with the specified verification token and the user computer and provide a user identifier in order to receive a dynamic verification value.Customized linkage rule 401B is similar to 401A except in 401B a mobile device is tied to the portable consumer device, verification token and the user identifier. -
Customized linkage rule 402A indicates that the portable consumer device is tied to the verification token and the user computer.Customized linkage rule 402B indicates that the portable consumer device is tied to the verification token and the mobile device. In this example, verification token is capable of being connected to the mobile device. -
Customized linkage rule 403A indicates that the portable consumer device is tied with the verification token.Customized linkage rule 404A indicates that the portable consumer device is tied to the user computer, and the customizedlinkage rule 404B indicates that the portable consumer device is tied to the mobile device.Customized linkage rules linkage rules -
Customized linkage rule 406A indicates that the verification token, the user computer and a user identifier are tied together.Customized linkage rule 406B indicates that the verification token, the mobile device and a user identifier are tied together. Therefore, the user can use any of his portable consumer devices (e.g. credit cards) with these combination of elements to perform a payment transaction.Customized linkage rules rules - The user identifier may be an identifier that is unique to the
user 110, as mentioned earlier, the user identifier may be in the form of biometric characteristics of theuser 110 such as voice signature or fingerprint. It may also be a password. The types of user identifiers utilized, may depend on the ability of the user communication devices and the verification token to support that technology. For example, if theverification token 122 or the user computer 120 are retrofitted with a fingerprint scanner, then the user has the ability to select the fingerprint as his user identifier. - In some embodiment, if the
user 110 wishes to use his voice signature as the user identifier, theuser 110 may be prompted to record his voice at the time of enrollment so that an audio file can be generated which represents the voice signature of theuser 110. Thereafter, when an authentication request message and a request for a dynamic verification value is received, theuser 110 will be prompted to provide a sample voice signature, by reading a sentence or speaking a word, that will be used by theIP Gateway 152 to compare with the user's audio file saved by theIP Gateway 152, (i.e. recorded at the time of enrollment) to determine whether the user voice matches with the audio file recorded during the enrollment process. - In one embodiment, during the enrollment process, a sentence or a word is spoken by the
user 110 and recorded by a server computer (e.g. IP Gateway server computer 153) that hosts the enrollment website. In another embodiment, theuser 110 may be provided with a phone number where he can call via hismobile device 118 and record his voice. Thereafter, when an authentication request message and a request for a dynamic verification value is received, via hismobile device 118 for example, theuser 110 is prompted to submit his user identifier which in this example is his voice signature. -
FIG. 5 , illustrate some examples of customized linkage rules that may be specified by theuser 110 for his portable consumer devices. As shown inFIG. 5 , theuser 110 may have four portable consumer devices each of which is associated with an account identifier. Exemplary account identifiers associated with the portable consumer devices are shown inFIG. 5 for accounts, 501, 502, 503, and 504. In the examples, shown inFIG. 5 , theuser 110 is in possession of twoverification tokens - In the examples shown in
FIG. 5 , theuser 110 chooses not to specify any customized linkage rules for theaccount 501. Therefore, theuser 110 is able to resume using the portable consumer device associated with theaccount 501 without having to use any particular verification token and user computer to perform payment transactions. As shown in Table A inFIG. 5 , a customized linkage rule is set by theuser 110 so thataccount 502 is linked with the user computer 507. Therefore, whenever theuser 110 wishes to request for a dynamic verification value, the request should be made with user computer 507. In this specific example, theuser 110 may use any verification token for requesting a dynamic verification value as long as that verification token is used with the user computer 507. - In another example shown in
FIG. 5 , a customized linkage rule is set so thataccount 503 is linked with theverification token 506 and user computer 507. However, it is specified that the user computer 507 is required for requesting a dynamic verification value if the amount of purchase is greater than $500.00. Therefore, in this specific example, when theuser 110 uses a portable consumer device associated with theaccount 504,verification token 506 should be used for requesting a dynamic verification value. In addition, if the purchase amount is greater than $500.00, then user computer 507 must be used with theverification token 506 for requesting the dynamic verification value. This may advantageously allow theuser 110 to perform the payment transactions that involve higher amounts with more security. - In yet another example shown in
FIG. 5 , a customized linkage rule is specified so thataccount 504 is linked withverification token 505 and user computers 507 and 508. In this specific example, a dynamic verification value can be requested foraccount 504 as long as theverification token 505 and any on one of the user computers 507 or 508 are used. - Table B in
FIG. 5 shows another customized linkage rule that does not involve any particular portable consumer device and account identifier. In some embodiments, theuser 110 may have a verification token that may be used with many different types of portable consumer devices that may be used to perform payment transactions across multiple payment processing networks. In this specific example, theuser 110 links theverification token 506 with the user computer 508. Therefore, regardless of which portable consumer device is used, a dynamic verification value may be requested as long as theverification token 506 is connected with the user computer 508. - In some embodiments, the account identifier of the portable consumer devices and the device identification of the verification token, and the user communication devices are used to check the customized linkage rules. As described before, the
IP Gateway 152 can save a unique device identification of user communication devices (e.g. user computer and mobile device) and verification tokens in addition to an account identifier associated with the portable consumer device in thedatabase 151. In one example, theIP Gateway 152 can obtain the device identification of the use communication devices that are used in the process of requesting a dynamic verification value and compare the device identification of the user communication devices with the ones saved in thedatabase 151 to determine whether the verification token and the user communication device devices are authentic. -
FIG. 5 illustrates exemplary account identifier for accounts 501-504 and exemplary device identification forverification tokens - Having described the enrollment process, the process of requesting and generating a dynamic verification value will now be described with reference to the figures.
-
FIG. 6 illustrates a flowchart that shows the process involved in receiving an authentication request message and a request for a dynamic verification value at theIP Gateway 152, and generating a dynamic verification value. As shown in the flowchart ofFIG. 6 , instep 601 the IPGateway server computer 153 in theIP Gateway 152 receives an authentication request message which can be a request for a dynamic verification value. Instep 602, thedetection module 161 which may be embodied as a program stored on the computer readable medium (CRM) 154 that is being run by the processor 156-2, checks to see if the incoming request is associated with an account identifier that has customized linkage rules (step 602). As described earlier, in the enrollment process the account identifier of the portable consumer device of the user 110 (e.g. portable consumer device 112) is associated with one or more customized linkage rules specified by theuser 110. The customized linkage rules may then be saved in thedatabase 151. Thedetection module 161 can search thedatabase 151 to determine whether the account identifier of the portable consumer device that was received as part of the data in the authentication request message is associated with any customized linkage rules. - If the
detection module 161 determines that the authentication request message is associated with an account identifier with customized linkage rules, then instep 603 theverification module 162 can determine whether the authentication request message complies with the specified customized linkage rules. Similar to thedetection module 161, theverification module 162 may be embodied as a program stored on the computer readable medium (CRM) 154 and run by the processor 156-2. - As described earlier, the unique device identifiers of the user communication devices such the
verification token 122, user computer 120 andmobile device 118 that are identified by theuser 110 to be part of the customized linkage rules are obtained during the enrollment process. The authentication request message can include the unique device identifiers of the user communication devices and/or verification tokens that are being used to generate and submit the authentication request message. Theverification module 162 then analyses the authentication request message to determine whether the user and/or the user communication devices being used are authentic. In this analysis, theverification module 162 may compare the unique device identifiers of the user communication devices and verification tokens identified in the authentication request message with the unique device identifiers associated with the account identifier in thedatabase 151. - For example, referring to
FIG. 1 , if a request is received from the user computer 120, and if theverification token 122 was also used by theuser 110 to extract and send the data of theportable consumer device 112, then theverification module 162 checks the customized linkage rule to determine the types of the user communication devices that must be used in an authentication request message. If the customized linkage rules indicates that both the user computer and the verification token must be used for the request, then theverification module 162 compares the unique device identifiers of the user computer 120 and theverification token 122 with the ones saved in thedatabase 151 to determine if they are the same devices that were identified by theuser 110 during the enrollment process. - Also, if the customized linkage rules involve the use of user identifiers such as voice signature, fingerprint of the user, password, etc. then the
verification module 162 prompts the user to provide such user identifiers. - In some embodiments, the
issuer 160 may impose a linkage rule for an account identifier associated with theportable consumer device 112. The linkage rules specified by theissuer 160 can also be saved in thedatabase 151. In such embodiments, theverification module 162 can check the authentication request message to determine if it complies with the issuer specific linkage rules. - If the request does not comply with the customized linkage rules (i.e. the combination and/or types of devices used are not the same as specified in the customized linkage rules), then in
step 604, theIP Gateway 152 denies the request and may notify theuser 110 that a dynamic verification value will not be generated. - If the request does comply with the customized linkage rules, then in
step 605, theIP Gateway 152 generates a dynamic verification value. Instep 606 a the dynamic verification value is sent to theverification token 122 and instep 606 b the dynamic verification value is send to thepayment processing network 150. - Thereafter, as described earlier, the dynamic verification value is automatically form-filled in the payment page of the
merchant website 130 by the form-fill application 260 shown inFIG. 2 . The merchant website then generates an authorization request message that will be sent to theacquirer 140.Acquirer 140 then forwards the authorization request message to thepayment processing network 150. At this point, thecomparison module 158 compares the dynamic verification value that was part of the authorization request message with the dynamic verification value that was received from theIP Gateway 152. If the dynamic verification values match, thepayment processing network 150 forwards the authorization request message to theissuer 160. - In some embodiments, if the customized linkage rules involves limit on the purchase amount such as the example shown in
FIG. 5 where the user computer 507 should be used for purchases of more than $500.00, then theIP Gateway 152 may indicate to thepayment processing network 150 that once the authorization request message arrives with the purchase price, the customized linkage rules should be once again visited by theverification module 162 to determine whether the final purchase price violates the specified customized linkage rule. If the customized linkage rule is violated, then the payment processing network may decline the transaction. - In some embodiments, the
payment processing network 150 may provide a list of user communication devices such a user computers that were involved in fraudulent transactions and therefore should be blacklisted. TheIP Gateway 152 can store the unique device identifiers of such user communication devices and verification tokens in thedatabase 151 so that for each request for a dynamic verification value the list of unauthorized user communication devices (also referred to as the blacklist) is checked to see if the request is coming from a device that has been blacklisted by thepayment processing network 150 and a dynamic verification value should not be generated. - In one example, a fraudster may use a stolen verification token with a user computer in a public library in an attempt to perform a fraudulent payment transaction. Upon discovering that the verification token was involved in a fraudulent transaction, the verification token may be blacklisted and future authentication requests from that verification token may be denied. In addition, if it is determined that a user computer in a public library is also being frequently used by fraudsters to perform fraudulent payment transactions, then the user computer may also be blacklisted.
- It can be appreciate that the embodiments of this novel invention provide many advantages. The ability to establish customized linkage rules provides a great level of security for payment transactions. The embodiments of the invention can substantially reduce the occurrence of unauthorized and fraudulent transactions. When a customized linkage rule indicates that a request for a dynamic verification value should come from a personal computer of the user, then even if a fraudster can find the personal information of the user, he cannot perform a payment transaction.
- The various participants and elements of the system shown in
FIG. 1 may operate one or more computer apparatuses to facilitate the functions described herein. Any of the elements inFIG. 1 may use any suitable number of subsystems to facilitate the functions described herein. Examples of such subsystems or components are shown inFIG. 7 . The subsystems shown inFIG. 7 are interconnected via asystem bus 775. Additional subsystems such as aprinter 774,keyboard 778, fixed disk 779 (or other memory comprising computer readable media), monitor 776, which is coupled todisplay adapter 782, and others are shown. Peripherals and input/output (I/O) devices, which couple to I/O controller 771, can be connected to the computer system by any number of means known in the art, such asserial port 777. For example,serial port 777 orexternal interface 781 can be used to connect the computer apparatus to a wide area network such as the Internet, a mouse input device, or a scanner. The interconnection via system bus allows thecentral processor 773 to communicate with each subsystem and to control the execution of instructions fromsystem memory 772 or the fixeddisk 779, as well as the exchange of information between subsystems. Thesystem memory 772 and/or the fixeddisk 779 may embody a computer readable medium. - The software components or functions described in this application may be implemented as software code to be executed by one or more processors using any suitable computer language such as, for example, Java, C++ or Perl using, for example, conventional or object-oriented techniques. The software code may be stored as a series of instructions, or commands on a computer-readable medium, such as a random access memory (RAM), a read-only memory (ROM), a magnetic medium such as a hard-drive or a floppy disk, or an optical medium such as a CD-ROM. Any such computer-readable medium may also reside on or within a single computational apparatus, and may be present on or within different computational apparatuses within a system or network.
- Embodiments of the present invention can be implemented in the form of control logic in software or hardware or a combination of both. The control logic may be stored in an information storage medium as a plurality of instructions adapted to direct an information processing device to perform a set of steps disclosed in embodiments of the present invention. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will appreciate other ways and/or methods to implement the present invention.
- In embodiments, any of the entities described herein may be embodied by a computer that performs any or all of the functions and steps disclosed.
- Any recitation of “a”, “an” or “the” is intended to mean “one or more” unless specifically indicated to the contrary.
- The above description is illustrative and is not restrictive. Many variations of the invention will become apparent to those skilled in the art upon review of the disclosure. The scope of the invention should, therefore, be determined not with reference to the above description, but instead should be determined with reference to the pending claims along with their full scope or equivalents.
Claims (20)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/038,268 US10430794B2 (en) | 2010-03-09 | 2011-03-01 | System and method including customized linkage rules in payment transactions |
US16/550,575 US11232455B2 (en) | 2010-03-09 | 2019-08-26 | System and method including customized linkage rules in payment transactions |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US31219610P | 2010-03-09 | 2010-03-09 | |
US13/038,268 US10430794B2 (en) | 2010-03-09 | 2011-03-01 | System and method including customized linkage rules in payment transactions |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/550,575 Continuation US11232455B2 (en) | 2010-03-09 | 2019-08-26 | System and method including customized linkage rules in payment transactions |
Publications (2)
Publication Number | Publication Date |
---|---|
US20110225090A1 true US20110225090A1 (en) | 2011-09-15 |
US10430794B2 US10430794B2 (en) | 2019-10-01 |
Family
ID=44560862
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/038,181 Abandoned US20110225094A1 (en) | 2010-03-09 | 2011-03-01 | System and method including dynamic verification value |
US13/038,268 Active 2034-01-07 US10430794B2 (en) | 2010-03-09 | 2011-03-01 | System and method including customized linkage rules in payment transactions |
US16/550,575 Active 2031-08-17 US11232455B2 (en) | 2010-03-09 | 2019-08-26 | System and method including customized linkage rules in payment transactions |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/038,181 Abandoned US20110225094A1 (en) | 2010-03-09 | 2011-03-01 | System and method including dynamic verification value |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/550,575 Active 2031-08-17 US11232455B2 (en) | 2010-03-09 | 2019-08-26 | System and method including customized linkage rules in payment transactions |
Country Status (4)
Country | Link |
---|---|
US (3) | US20110225094A1 (en) |
AU (1) | AU2011224755A1 (en) |
CA (1) | CA2792364A1 (en) |
WO (2) | WO2011112396A2 (en) |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8433288B2 (en) * | 2011-09-13 | 2013-04-30 | Bank Of America Corporation | Multilevel authentication |
US20140108263A1 (en) * | 2012-10-17 | 2014-04-17 | Royal Bank Of Canada | Virtualization and secure processing of data |
US20150081545A1 (en) * | 2013-09-18 | 2015-03-19 | Greg Gissler | Secure payment by mobile phone |
US20150245268A1 (en) * | 2014-02-21 | 2015-08-27 | Telefonaktiebolaget L M Ericsson (Publ) | Traffic Steering Between WLAN and Cellular Networks |
US20150269701A1 (en) * | 2014-03-24 | 2015-09-24 | Mastercard International Incorporated | Systems and methods for identity validation and verification |
US9204298B2 (en) | 2011-09-13 | 2015-12-01 | Bank Of America Corporation | Multilevel authentication |
US20160005041A1 (en) * | 2014-07-03 | 2016-01-07 | Mastercard International Incorporated | Method and system for maintaining privacy and compliance in the use of account reissuance data |
US20160105427A1 (en) * | 2014-10-14 | 2016-04-14 | Cisco Technology, Inc. | Attesting Authenticity of Infrastructure Modules |
US9633659B1 (en) * | 2016-01-20 | 2017-04-25 | Motorola Mobility Llc | Method and apparatus for voice enrolling an electronic computing device |
CN107451136A (en) * | 2016-05-30 | 2017-12-08 | 阿里巴巴集团控股有限公司 | Verification of data method and device |
US20190114598A1 (en) * | 2017-10-18 | 2019-04-18 | Mastercard International Incorporated | Payment network as a platform |
US20190379675A1 (en) * | 2018-06-07 | 2019-12-12 | Sap Se | Web application session security |
US10935425B2 (en) * | 2017-07-18 | 2021-03-02 | Shimadzu Corporation | Spectroscopic detector |
US20210065208A1 (en) * | 2019-08-27 | 2021-03-04 | Coupang Corp. | Computer-implemented method for detecting fraudulent transactions using locality sensitive hashing and locality outlier factor algorithms |
US10992759B2 (en) | 2018-06-07 | 2021-04-27 | Sap Se | Web application session security with protected session identifiers |
US11012240B1 (en) * | 2012-01-18 | 2021-05-18 | Neustar, Inc. | Methods and systems for device authentication |
US11080700B2 (en) | 2015-01-19 | 2021-08-03 | Royal Bank Of Canada | Secure processing of electronic payments |
US11080701B2 (en) | 2015-07-02 | 2021-08-03 | Royal Bank Of Canada | Secure processing of electronic payments |
EP3163487B1 (en) * | 2015-10-27 | 2021-08-18 | Ingenico Group | Method, terminal, and computer program for securing the processing of transactional data |
US11131976B2 (en) * | 2016-07-12 | 2021-09-28 | Tencent Technology (Shenzhen) Company Limited | Device control system, method and apparatus, and gateways |
US11210648B2 (en) | 2012-10-17 | 2021-12-28 | Royal Bank Of Canada | Systems, methods, and devices for secure generation and processing of data sets representing pre-funded payments |
US11354651B2 (en) | 2015-01-19 | 2022-06-07 | Royal Bank Of Canada | System and method for location-based token transaction processing |
US11599879B2 (en) | 2015-07-02 | 2023-03-07 | Royal Bank Of Canada | Processing of electronic transactions |
US11961075B2 (en) | 2014-10-10 | 2024-04-16 | Royal Bank Of Canada | Systems for processing electronic transactions |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140067675A1 (en) * | 2012-09-06 | 2014-03-06 | American Express Travel Related Services Company, Inc. | Authentication using dynamic codes |
AU2011224755A1 (en) | 2010-03-09 | 2012-09-27 | Visa International Service Association | System and method including dynamic verification value |
US9805348B2 (en) * | 2010-09-22 | 2017-10-31 | Mastercard International Incorporated | Methods and systems for initiating a financial transaction by a cardholder device |
US20120221466A1 (en) * | 2011-02-28 | 2012-08-30 | Thomas Finley Look | Method for improved financial transactions |
US20130110658A1 (en) * | 2011-05-05 | 2013-05-02 | Transaction Network Services, Inc. | Systems and methods for enabling mobile payments |
US20130030936A1 (en) * | 2011-07-28 | 2013-01-31 | American Express Travel Related Services Company, Inc. | Systems and methods for generating and using a digital pass |
GB2495704B (en) * | 2011-10-12 | 2014-03-26 | Technology Business Man Ltd | ID Authentication |
US20130282581A1 (en) * | 2012-04-18 | 2013-10-24 | Infosys Limited | Mobile device-based cardless financial transactions |
EP2997532A4 (en) * | 2013-05-15 | 2016-05-11 | Visa Int Service Ass | Mobile tokenization hub |
EP3232399A1 (en) | 2016-04-12 | 2017-10-18 | Visa Europe Limited | System for performing a validity check of a user device |
GB2562199B (en) * | 2017-02-03 | 2022-02-16 | Worldpay Ltd | Terminal for conducting electronic transactions |
EP3837651A1 (en) * | 2018-08-17 | 2021-06-23 | Visa International Service Association | Techniques for securely communicating sensitive data |
EP3660767A1 (en) * | 2018-11-28 | 2020-06-03 | Mastercard International Incorporated | Improvements relating to security and authentication of interaction data |
CN109711847B (en) * | 2018-12-26 | 2020-05-15 | 巽腾(广东)科技有限公司 | Near field information authentication method and device, electronic equipment and computer storage medium |
US11030293B2 (en) * | 2018-12-31 | 2021-06-08 | Beijing Didi Infinity Technology And Development Co., Ltd. | Method and system for configurable device fingerprinting |
EP3809352A1 (en) * | 2019-10-18 | 2021-04-21 | Mastercard International Incorporated | Authentication for secure transactions in a multi-server environment |
Citations (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5724423A (en) * | 1995-09-18 | 1998-03-03 | Telefonaktiebolaget Lm Ericsson | Method and apparatus for user authentication |
US20030126094A1 (en) * | 2001-07-11 | 2003-07-03 | Fisher Douglas C. | Persistent dynamic payment service |
US6609113B1 (en) * | 1999-05-03 | 2003-08-19 | The Chase Manhattan Bank | Method and system for processing internet payments using the electronic funds transfer network |
US20040073688A1 (en) * | 2002-09-30 | 2004-04-15 | Sampson Scott E. | Electronic payment validation using Transaction Authorization Tokens |
US20050043997A1 (en) * | 2003-08-18 | 2005-02-24 | Sahota Jagdeep Singh | Method and system for generating a dynamic verification value |
US20060229978A1 (en) * | 2005-04-05 | 2006-10-12 | Dxstorm.Com Inc. | Electronic balance checking and credit approval system for use in conducting electronic transactions |
US20070294182A1 (en) * | 2006-06-19 | 2007-12-20 | Ayman Hammad | Track data encryption |
US20080029593A1 (en) * | 2003-08-18 | 2008-02-07 | Ayman Hammad | Method and System for Generating a Dynamic Verification Value |
US20080054079A1 (en) * | 2005-05-09 | 2008-03-06 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US20080288405A1 (en) * | 2007-05-20 | 2008-11-20 | Michael Sasha John | Systems and Methods for Automatic and Transparent Client Authentication and Online Transaction Verification |
US20090106148A1 (en) * | 2007-10-17 | 2009-04-23 | Christian Prada | Pre-paid financial system |
US20090150269A1 (en) * | 1999-11-05 | 2009-06-11 | American Express Travel Related Services Company, Inc. | Systems and Methods for Approval of an Allocation |
US20090210712A1 (en) * | 2008-02-19 | 2009-08-20 | Nicolas Fort | Method for server-side detection of man-in-the-middle attacks |
US7584153B2 (en) * | 2004-03-15 | 2009-09-01 | Qsecure, Inc. | Financial transactions with dynamic card verification values |
US20090271211A1 (en) * | 2008-04-29 | 2009-10-29 | Ayman Hammad | Device including user exclusive data tag |
US20090313168A1 (en) * | 2008-06-16 | 2009-12-17 | Visa U.S.A. Inc. | System and Method for Authorizing Financial Transactions with Online Merchants |
US20090319784A1 (en) * | 2008-06-24 | 2009-12-24 | Patrick Faith | Dynamic verification value system and method |
US20100027786A1 (en) * | 2008-02-14 | 2010-02-04 | Patrick Faith | Dynamic encryption authentication |
US20100088752A1 (en) * | 2008-10-03 | 2010-04-08 | Vikram Nagulakonda | Identifier Binding for Automated Web Processing |
US20100121767A1 (en) * | 2008-11-08 | 2010-05-13 | Coulter Todd R | Intermediary service and method for processing financial transaction data with mobile device confirmation |
US7720756B2 (en) * | 2000-01-25 | 2010-05-18 | Kavounas Gregory T | Methods, devices and bank computers for consumers using communicators to wire funds to sellers and vending machines |
US20100133335A1 (en) * | 2008-11-28 | 2010-06-03 | Hazem Abdel Maguid | System and method for mobile payment |
US20100293382A1 (en) * | 2009-05-15 | 2010-11-18 | Ayman Hammad | Verification of portable consumer devices |
US20100299267A1 (en) * | 2009-05-20 | 2010-11-25 | Patrick Faith | Device including encrypted data for expiration date and verification value creation |
US20100318783A1 (en) * | 2009-06-10 | 2010-12-16 | Ashwin Raj | Service activation using algorithmically defined key |
US7877325B2 (en) * | 1999-11-05 | 2011-01-25 | American Express Travel Related Services Company, Inc. | Systems and methods for settling an allocation of an amount between transaction accounts |
US8121945B2 (en) * | 2006-07-06 | 2012-02-21 | Firethorn Mobile, Inc. | Methods and systems for payment method selection by a payee in a mobile environment |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7707120B2 (en) | 2002-04-17 | 2010-04-27 | Visa International Service Association | Mobile account authentication service |
KR101140223B1 (en) * | 2005-08-19 | 2012-04-26 | 주식회사 비즈모델라인 | Device for Processing a Payment |
US7814787B2 (en) | 2006-09-20 | 2010-10-19 | Itt Manufacturing Enterprises, Inc. | Combined oil level or condition sensor and sight oil level gage |
ES2350775B1 (en) * | 2008-04-14 | 2011-10-10 | Avenida Diagonal 477, S.L | AUTHORIZATION PROCEDURE FOR A TRANSACTION BETWEEN A COMPUTER AND A REMOTE SERVER AND COMMUNICATION SYSTEM, WITH IMPROVED SECURITY. |
AU2011224755A1 (en) | 2010-03-09 | 2012-09-27 | Visa International Service Association | System and method including dynamic verification value |
US8364594B2 (en) | 2010-03-09 | 2013-01-29 | Visa International Service Association | System and method including security parameters used for generation of verification value |
-
2011
- 2011-03-01 AU AU2011224755A patent/AU2011224755A1/en not_active Abandoned
- 2011-03-01 CA CA2792364A patent/CA2792364A1/en not_active Abandoned
- 2011-03-01 WO PCT/US2011/026757 patent/WO2011112396A2/en active Application Filing
- 2011-03-01 US US13/038,181 patent/US20110225094A1/en not_active Abandoned
- 2011-03-01 WO PCT/US2011/026747 patent/WO2011112394A2/en active Application Filing
- 2011-03-01 US US13/038,268 patent/US10430794B2/en active Active
-
2019
- 2019-08-26 US US16/550,575 patent/US11232455B2/en active Active
Patent Citations (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5724423A (en) * | 1995-09-18 | 1998-03-03 | Telefonaktiebolaget Lm Ericsson | Method and apparatus for user authentication |
US6609113B1 (en) * | 1999-05-03 | 2003-08-19 | The Chase Manhattan Bank | Method and system for processing internet payments using the electronic funds transfer network |
US7899744B2 (en) * | 1999-11-05 | 2011-03-01 | American Express Travel Related Services Company, Inc. | Systems and methods for approval of an allocation |
US7877325B2 (en) * | 1999-11-05 | 2011-01-25 | American Express Travel Related Services Company, Inc. | Systems and methods for settling an allocation of an amount between transaction accounts |
US20090150269A1 (en) * | 1999-11-05 | 2009-06-11 | American Express Travel Related Services Company, Inc. | Systems and Methods for Approval of an Allocation |
US7720756B2 (en) * | 2000-01-25 | 2010-05-18 | Kavounas Gregory T | Methods, devices and bank computers for consumers using communicators to wire funds to sellers and vending machines |
US20030126094A1 (en) * | 2001-07-11 | 2003-07-03 | Fisher Douglas C. | Persistent dynamic payment service |
US20040073688A1 (en) * | 2002-09-30 | 2004-04-15 | Sampson Scott E. | Electronic payment validation using Transaction Authorization Tokens |
US20080029593A1 (en) * | 2003-08-18 | 2008-02-07 | Ayman Hammad | Method and System for Generating a Dynamic Verification Value |
US7761374B2 (en) * | 2003-08-18 | 2010-07-20 | Visa International Service Association | Method and system for generating a dynamic verification value |
US20050043997A1 (en) * | 2003-08-18 | 2005-02-24 | Sahota Jagdeep Singh | Method and system for generating a dynamic verification value |
US7584153B2 (en) * | 2004-03-15 | 2009-09-01 | Qsecure, Inc. | Financial transactions with dynamic card verification values |
US20060229978A1 (en) * | 2005-04-05 | 2006-10-12 | Dxstorm.Com Inc. | Electronic balance checking and credit approval system for use in conducting electronic transactions |
US20080054079A1 (en) * | 2005-05-09 | 2008-03-06 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US20080065555A1 (en) * | 2005-05-09 | 2008-03-13 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US7810165B2 (en) * | 2006-06-19 | 2010-10-05 | Visa U.S.A. Inc. | Portable consumer device configured to generate dynamic authentication data |
US20080040276A1 (en) * | 2006-06-19 | 2008-02-14 | Ayman Hammad | Transaction Authentication Using Network |
US20080034221A1 (en) * | 2006-06-19 | 2008-02-07 | Ayman Hammad | Portable consumer device configured to generate dynamic authentication data |
US20070294182A1 (en) * | 2006-06-19 | 2007-12-20 | Ayman Hammad | Track data encryption |
US8121945B2 (en) * | 2006-07-06 | 2012-02-21 | Firethorn Mobile, Inc. | Methods and systems for payment method selection by a payee in a mobile environment |
US20080288405A1 (en) * | 2007-05-20 | 2008-11-20 | Michael Sasha John | Systems and Methods for Automatic and Transparent Client Authentication and Online Transaction Verification |
US20090106148A1 (en) * | 2007-10-17 | 2009-04-23 | Christian Prada | Pre-paid financial system |
US20100027786A1 (en) * | 2008-02-14 | 2010-02-04 | Patrick Faith | Dynamic encryption authentication |
US20090210712A1 (en) * | 2008-02-19 | 2009-08-20 | Nicolas Fort | Method for server-side detection of man-in-the-middle attacks |
US20090271211A1 (en) * | 2008-04-29 | 2009-10-29 | Ayman Hammad | Device including user exclusive data tag |
US20090313168A1 (en) * | 2008-06-16 | 2009-12-17 | Visa U.S.A. Inc. | System and Method for Authorizing Financial Transactions with Online Merchants |
US20090319430A1 (en) * | 2008-06-24 | 2009-12-24 | Patrick Faith | Mobile phone including dynamic verification value |
US20090319784A1 (en) * | 2008-06-24 | 2009-12-24 | Patrick Faith | Dynamic verification value system and method |
US20100088752A1 (en) * | 2008-10-03 | 2010-04-08 | Vikram Nagulakonda | Identifier Binding for Automated Web Processing |
US20100121767A1 (en) * | 2008-11-08 | 2010-05-13 | Coulter Todd R | Intermediary service and method for processing financial transaction data with mobile device confirmation |
US20100133335A1 (en) * | 2008-11-28 | 2010-06-03 | Hazem Abdel Maguid | System and method for mobile payment |
US20100293382A1 (en) * | 2009-05-15 | 2010-11-18 | Ayman Hammad | Verification of portable consumer devices |
US20100299267A1 (en) * | 2009-05-20 | 2010-11-25 | Patrick Faith | Device including encrypted data for expiration date and verification value creation |
US20100318783A1 (en) * | 2009-06-10 | 2010-12-16 | Ashwin Raj | Service activation using algorithmically defined key |
Cited By (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9204298B2 (en) | 2011-09-13 | 2015-12-01 | Bank Of America Corporation | Multilevel authentication |
US8433288B2 (en) * | 2011-09-13 | 2013-04-30 | Bank Of America Corporation | Multilevel authentication |
US11818272B2 (en) | 2012-01-18 | 2023-11-14 | Neustar, Inc. | Methods and systems for device authentication |
US11012240B1 (en) * | 2012-01-18 | 2021-05-18 | Neustar, Inc. | Methods and systems for device authentication |
US11210648B2 (en) | 2012-10-17 | 2021-12-28 | Royal Bank Of Canada | Systems, methods, and devices for secure generation and processing of data sets representing pre-funded payments |
US20230196356A1 (en) * | 2012-10-17 | 2023-06-22 | Royal Bank Of Canada | Virtualization and secure processing of data |
US20210065176A1 (en) * | 2012-10-17 | 2021-03-04 | Royal Bank Of Canada | Virtualization and secure processing of data |
US9082119B2 (en) * | 2012-10-17 | 2015-07-14 | Royal Bank of Canada. | Virtualization and secure processing of data |
US10846692B2 (en) | 2012-10-17 | 2020-11-24 | Royal Bank Of Canada | Virtualization and secure processing of data |
US11615414B2 (en) * | 2012-10-17 | 2023-03-28 | Royal Bank Of Canada | Virtualization and secure processing of data |
US20140279552A1 (en) * | 2012-10-17 | 2014-09-18 | Royal Bank Of Canada | Virtualization and secure processing of data |
US12008566B2 (en) * | 2012-10-17 | 2024-06-11 | Royal Bank Of Canada | Virtualization and secure processing of data |
US10755274B2 (en) | 2012-10-17 | 2020-08-25 | Royal Bank Of Canada | Virtualization and secure processing of data |
US20140108263A1 (en) * | 2012-10-17 | 2014-04-17 | Royal Bank Of Canada | Virtualization and secure processing of data |
US20150081545A1 (en) * | 2013-09-18 | 2015-03-19 | Greg Gissler | Secure payment by mobile phone |
US20150245268A1 (en) * | 2014-02-21 | 2015-08-27 | Telefonaktiebolaget L M Ericsson (Publ) | Traffic Steering Between WLAN and Cellular Networks |
US9980192B2 (en) * | 2014-02-21 | 2018-05-22 | Telefonaktiebolaget L M Ericsson (Publ) | Traffic steering between WLAN and cellular networks |
US10176542B2 (en) * | 2014-03-24 | 2019-01-08 | Mastercard International Incorporated | Systems and methods for identity validation and verification |
RU2662404C2 (en) * | 2014-03-24 | 2018-07-25 | Мастеркард Интернэшнл Инкорпорейтед | Systems and methods for personal identity verification and authentication |
US20150269701A1 (en) * | 2014-03-24 | 2015-09-24 | Mastercard International Incorporated | Systems and methods for identity validation and verification |
US10373153B2 (en) * | 2014-07-03 | 2019-08-06 | Mastercard International Incorporated | Method and system for maintaining privacy and compliance in the use of account reissuance data |
US20160005041A1 (en) * | 2014-07-03 | 2016-01-07 | Mastercard International Incorporated | Method and system for maintaining privacy and compliance in the use of account reissuance data |
US11762877B2 (en) | 2014-07-03 | 2023-09-19 | Mastercard International Incorporated | Method and system for maintaining privacy and compliance in the use of account reissuance data |
US11961075B2 (en) | 2014-10-10 | 2024-04-16 | Royal Bank Of Canada | Systems for processing electronic transactions |
US9680816B2 (en) * | 2014-10-14 | 2017-06-13 | Cisco Technology, Inc. | Attesting authenticity of infrastructure modules |
US20160105427A1 (en) * | 2014-10-14 | 2016-04-14 | Cisco Technology, Inc. | Attesting Authenticity of Infrastructure Modules |
US11354651B2 (en) | 2015-01-19 | 2022-06-07 | Royal Bank Of Canada | System and method for location-based token transaction processing |
US11080700B2 (en) | 2015-01-19 | 2021-08-03 | Royal Bank Of Canada | Secure processing of electronic payments |
US11080701B2 (en) | 2015-07-02 | 2021-08-03 | Royal Bank Of Canada | Secure processing of electronic payments |
US11599879B2 (en) | 2015-07-02 | 2023-03-07 | Royal Bank Of Canada | Processing of electronic transactions |
US11625713B2 (en) | 2015-10-27 | 2023-04-11 | Banks And Acquirers International Holding | Method for securing transactional data processing, corresponding terminal and computer program |
EP3163487B1 (en) * | 2015-10-27 | 2021-08-18 | Ingenico Group | Method, terminal, and computer program for securing the processing of transactional data |
US9633659B1 (en) * | 2016-01-20 | 2017-04-25 | Motorola Mobility Llc | Method and apparatus for voice enrolling an electronic computing device |
CN107451136A (en) * | 2016-05-30 | 2017-12-08 | 阿里巴巴集团控股有限公司 | Verification of data method and device |
US11131976B2 (en) * | 2016-07-12 | 2021-09-28 | Tencent Technology (Shenzhen) Company Limited | Device control system, method and apparatus, and gateways |
US10935425B2 (en) * | 2017-07-18 | 2021-03-02 | Shimadzu Corporation | Spectroscopic detector |
US20190114598A1 (en) * | 2017-10-18 | 2019-04-18 | Mastercard International Incorporated | Payment network as a platform |
US10992759B2 (en) | 2018-06-07 | 2021-04-27 | Sap Se | Web application session security with protected session identifiers |
US10972481B2 (en) * | 2018-06-07 | 2021-04-06 | Sap Se | Web application session security |
US20190379675A1 (en) * | 2018-06-07 | 2019-12-12 | Sap Se | Web application session security |
US11263643B2 (en) * | 2019-08-27 | 2022-03-01 | Coupang Corp. | Computer-implemented method for detecting fraudulent transactions using locality sensitive hashing and locality outlier factor algorithms |
US20210065208A1 (en) * | 2019-08-27 | 2021-03-04 | Coupang Corp. | Computer-implemented method for detecting fraudulent transactions using locality sensitive hashing and locality outlier factor algorithms |
Also Published As
Publication number | Publication date |
---|---|
WO2011112394A3 (en) | 2012-01-05 |
WO2011112394A2 (en) | 2011-09-15 |
US20110225094A1 (en) | 2011-09-15 |
US20190378138A1 (en) | 2019-12-12 |
US10430794B2 (en) | 2019-10-01 |
AU2011224755A1 (en) | 2012-09-27 |
US11232455B2 (en) | 2022-01-25 |
CA2792364A1 (en) | 2011-09-15 |
WO2011112396A3 (en) | 2012-01-12 |
WO2011112396A2 (en) | 2011-09-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11232455B2 (en) | System and method including customized linkage rules in payment transactions | |
US11568405B2 (en) | Identification and verification for provisioning mobile application | |
US11398910B2 (en) | Token provisioning utilizing a secure authentication system | |
US20220391891A1 (en) | Secure Authentication System With Token Service | |
US10909539B2 (en) | Enhancements to transaction processing in a secure environment using a merchant computer | |
AU2016255769C1 (en) | Tokenization capable authentication framework | |
US10313321B2 (en) | Tokenization of co-network accounts | |
US9996837B2 (en) | Integration of secure protocols into a fraud detection system | |
US10552828B2 (en) | Multiple tokenization for authentication | |
US8364594B2 (en) | System and method including security parameters used for generation of verification value | |
US20110093397A1 (en) | Anti-phishing system and method including list with user data | |
CA3016858C (en) | Tokenization of co-network accounts | |
EP3776425B1 (en) | Secure authentication system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: VISA INTERNATIONAL SERVICE ASSOCIATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HAMMAD, AYMAN;REEL/FRAME:025885/0876 Effective date: 20110222 |
|
STCV | Information on status: appeal procedure |
Free format text: BOARD OF APPEALS DECISION RENDERED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |